Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
arrival notice.exe

Overview

General Information

Sample name:arrival notice.exe
Analysis ID:1466048
MD5:3ed45724ae4635f06eb3be7ca4fe97af
SHA1:f255198b567d8aee91f08335760e06db43de42aa
SHA256:ce69c0e4efa80c87b672f5fe7ec35808b24d05a1feffba954720e8a801a8acac
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • arrival notice.exe (PID: 6552 cmdline: "C:\Users\user\Desktop\arrival notice.exe" MD5: 3ED45724AE4635F06EB3BE7CA4FE97AF)
    • RegSvcs.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\arrival notice.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33e6d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33edf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x33f69:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33ffb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34065:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x340d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x3416d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x341fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                1.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x33e6d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33edf:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33f69:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33ffb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x34065:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x340d7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3416d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x341fd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.arrival notice.exe.b10000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.arrival notice.exe.b10000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 148.66.136.151, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 6616, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    Timestamp:07/02/24-13:19:43.921924
                    SID:2840032
                    Source Port:58453
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:32.752876
                    SID:2851779
                    Source Port:58452
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:16:00.574256
                    SID:2840032
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:08.376508
                    SID:2855542
                    Source Port:58443
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:38.860424
                    SID:2840032
                    Source Port:58447
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:38.860181
                    SID:2030171
                    Source Port:58447
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:43.919056
                    SID:2030171
                    Source Port:58453
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:16:00.574200
                    SID:2030171
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:17:50.363623
                    SID:2030171
                    Source Port:58441
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:08.376543
                    SID:2840032
                    Source Port:58443
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:17:50.363642
                    SID:2855542
                    Source Port:58441
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:43.919056
                    SID:2851779
                    Source Port:58453
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:08.376466
                    SID:2030171
                    Source Port:58443
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:38.860321
                    SID:2851779
                    Source Port:58447
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:16:00.574256
                    SID:2851779
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:17:50.363686
                    SID:2840032
                    Source Port:58441
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:32.752837
                    SID:2030171
                    Source Port:58452
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:32.752876
                    SID:2855542
                    Source Port:58452
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:16:00.574256
                    SID:2855542
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:16:00.574256
                    SID:2855245
                    Source Port:49731
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:08.376508
                    SID:2851779
                    Source Port:58443
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:43.919056
                    SID:2855542
                    Source Port:58453
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:18:38.860321
                    SID:2855542
                    Source Port:58447
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:19:32.752963
                    SID:2840032
                    Source Port:58452
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:07/02/24-13:17:50.363642
                    SID:2851779
                    Source Port:58441
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mahesh-ent.com", "Username": "info@mahesh-ent.com", "Password": "M@hesh3981"}
                    Source: arrival notice.exeReversingLabs: Detection: 68%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: arrival notice.exeJoe Sandbox ML: detected
                    Source: arrival notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: arrival notice.exe, 00000000.00000003.1647838419.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, arrival notice.exe, 00000000.00000003.1647947568.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: arrival notice.exe, 00000000.00000003.1647838419.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, arrival notice.exe, 00000000.00000003.1647947568.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A34696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A34696
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A3C9C7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3C93C FindFirstFileW,FindClose,0_2_00A3C93C
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A3F200
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A3F35D
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A3F65E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A33A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A33A2B
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A33D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A33D4E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A3BF27

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:58441 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:58441 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:58441 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:58441 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:58443 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:58443 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:58443 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:58443 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:58447 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:58447 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:58447 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:58447 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:58452 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:58452 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:58452 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:58452 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:58453 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:58453 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:58453 -> 148.66.136.151:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:58453 -> 148.66.136.151:587
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: Joe Sandbox ViewIP Address: 148.66.136.151 148.66.136.151
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 148.66.136.151:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A425E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00A425E2
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.mahesh-ent.com
                    Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                    Source: RegSvcs.exe, 00000001.00000002.4111551921.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000003202000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000303A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000307F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000319A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000002F2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mahesh-ent.com
                    Source: RegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: arrival notice.exe, 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: arrival notice.exe, 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, 3DlgK9re6m.cs.Net Code: S8rY0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A4425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A4425A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A44458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A44458
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A4425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A4425A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A30219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00A30219
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A5CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A5CDAC

                    System Summary

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.arrival notice.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: This is a third-party compiled AutoIt script.0_2_009D3B4C
                    Source: arrival notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: arrival notice.exe, 00000000.00000000.1638384806.0000000000A85000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fad4c517-e
                    Source: arrival notice.exe, 00000000.00000000.1638384806.0000000000A85000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c48fb060-f
                    Source: arrival notice.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fd728e47-f
                    Source: arrival notice.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9ea89eeb-f
                    Source: initial sampleStatic PE information: Filename: arrival notice.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A340B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00A340B1
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A28858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A28858
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A3545F
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009DE8000_2_009DE800
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FDBB50_2_009FDBB5
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A5804A0_2_00A5804A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009DE0600_2_009DE060
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E41400_2_009E4140
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F24050_2_009F2405
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A065220_2_00A06522
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A506650_2_00A50665
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A0267E0_2_00A0267E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F283A0_2_009F283A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E68430_2_009E6843
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A089DF0_2_00A089DF
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A06A940_2_00A06A94
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A50AE20_2_00A50AE2
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E8A0E0_2_009E8A0E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A2EB070_2_00A2EB07
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A38B130_2_00A38B13
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FCD610_2_009FCD61
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A070060_2_00A07006
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E31900_2_009E3190
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E710E0_2_009E710E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D12870_2_009D1287
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F33C70_2_009F33C7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FF4190_2_009FF419
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E56800_2_009E5680
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F16C40_2_009F16C4
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F78D30_2_009F78D3
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009E58C00_2_009E58C0
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F1BB80_2_009F1BB8
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A09D050_2_00A09D05
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009DFE400_2_009DFE40
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F1FD00_2_009F1FD0
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FBFE60_2_009FBFE6
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009935F00_2_009935F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DCE2B81_2_02DCE2B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DC41D01_2_02DC41D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DC4AA01_2_02DC4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DC3E881_2_02DC3E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DCA9801_2_02DCA980
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F55881_2_068F5588
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F65D01_2_068F65D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F7D581_2_068F7D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068FB2031_2_068FB203
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F30401_2_068F3040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068FC1581_2_068FC158
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F76781_2_068F7678
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F5CBB1_2_068F5CBB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068FE3801_2_068FE380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F23381_2_068F2338
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F00401_2_068F0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F00391_2_068F0039
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_068F00311_2_068F0031
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: String function: 009F8B40 appears 42 times
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: String function: 009F0D27 appears 70 times
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: String function: 009D7F41 appears 35 times
                    Source: arrival notice.exe, 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefcc0edeb-3644-44a7-8b6d-3364cecb7337.exe4 vs arrival notice.exe
                    Source: arrival notice.exe, 00000000.00000003.1646795521.0000000003B83000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs arrival notice.exe
                    Source: arrival notice.exe, 00000000.00000003.1648330544.0000000003D2D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs arrival notice.exe
                    Source: arrival notice.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.arrival notice.exe.b10000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@4/2
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3A2D5 GetLastError,FormatMessageW,0_2_00A3A2D5
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A28713 AdjustTokenPrivileges,CloseHandle,0_2_00A28713
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A28CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A28CC3
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A3B59E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A4F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A4F121
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A486D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00A486D0
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_009D4FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\arrival notice.exeFile created: C:\Users\user\AppData\Local\Temp\aut8EEC.tmpJump to behavior
                    Source: arrival notice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: arrival notice.exeReversingLabs: Detection: 68%
                    Source: unknownProcess created: C:\Users\user\Desktop\arrival notice.exe "C:\Users\user\Desktop\arrival notice.exe"
                    Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\arrival notice.exe"
                    Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\arrival notice.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: arrival notice.exeStatic file information: File size 1267712 > 1048576
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: arrival notice.exe, 00000000.00000003.1647838419.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, arrival notice.exe, 00000000.00000003.1647947568.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: arrival notice.exe, 00000000.00000003.1647838419.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, arrival notice.exe, 00000000.00000003.1647947568.0000000003C00000.00000004.00001000.00020000.00000000.sdmp
                    Source: arrival notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: arrival notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: arrival notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: arrival notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: arrival notice.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A4C304 LoadLibraryA,GetProcAddress,0_2_00A4C304
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A38719 push FFFFFF8Bh; iretd 0_2_00A3871B
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FE94F push edi; ret 0_2_009FE951
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FEA68 push esi; ret 0_2_009FEA6A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F8B85 push ecx; ret 0_2_009F8B98
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FEC43 push esi; ret 0_2_009FEC45
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FED2C push edi; ret 0_2_009FED2E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DC0600 push edx; ret 1_2_02DC061A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_02DC0C55 push edi; retf 1_2_02DC0C7A
                    Source: 0.2.arrival notice.exe.b10000.1.raw.unpack, SMn5.csHigh entropy of concatenated method names: '_8Vimx', 'f7lK', 'uMKvoi6J', 'FWTI9h04fKT', 'OvYNDn1nF7', 'Uc1YsRO0ov', 'qvyIh', 'Q626D', 'VHPMMtos', 'MchLpClTgX'

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (68).png
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_009D4A35
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A555FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A555FD
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_009F33C7
                    Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\arrival notice.exeAPI/Special instruction interceptor: Address: 993214
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2476Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7347Jump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-101463
                    Source: C:\Users\user\Desktop\arrival notice.exeAPI coverage: 4.7 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A34696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A34696
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00A3C9C7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3C93C FindFirstFileW,FindClose,0_2_00A3C93C
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A3F200
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A3F35D
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A3F65E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A33A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A33A2B
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A33D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A33D4E
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A3BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00A3BF27
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97949Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97700Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97483Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97138Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96813Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94591Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94374Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94264Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93893Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93713Jump to behavior
                    Source: selectee.0.drBinary or memory string: PBVmCI
                    Source: RegSvcs.exe, 00000001.00000002.4114538473.000000000624D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                    Source: C:\Users\user\Desktop\arrival notice.exeAPI call chain: ExitProcess graph end nodegraph_0-98701
                    Source: C:\Users\user\Desktop\arrival notice.exeAPI call chain: ExitProcess graph end nodegraph_0-98767
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A441FD BlockInput,0_2_00A441FD
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_009D3B4C
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A05CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A05CCC
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A4C304 LoadLibraryA,GetProcAddress,0_2_00A4C304
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00993480 mov eax, dword ptr fs:[00000030h]0_2_00993480
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009934E0 mov eax, dword ptr fs:[00000030h]0_2_009934E0
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00991E70 mov eax, dword ptr fs:[00000030h]0_2_00991E70
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A281F7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009FA395
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009FA364 SetUnhandledExceptionFilter,0_2_009FA364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D5E008Jump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A28C93 LogonUserW,0_2_00A28C93
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_009D3B4C
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_009D4A35
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A34EF5 mouse_event,0_2_00A34EF5
                    Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\arrival notice.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00A281F7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A34C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A34C03
                    Source: arrival notice.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: arrival notice.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009F886B cpuid 0_2_009F886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A050D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00A050D7
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A12230 GetUserNameW,0_2_00A12230
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A0418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A0418A
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_009D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009D4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4111551921.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: arrival notice.exe PID: 6552, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6616, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: arrival notice.exeBinary or memory string: WIN_81
                    Source: arrival notice.exeBinary or memory string: WIN_XP
                    Source: arrival notice.exeBinary or memory string: WIN_XPe
                    Source: arrival notice.exeBinary or memory string: WIN_VISTA
                    Source: arrival notice.exeBinary or memory string: WIN_7
                    Source: arrival notice.exeBinary or memory string: WIN_8
                    Source: arrival notice.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4111551921.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: arrival notice.exe PID: 6552, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6616, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.arrival notice.exe.b10000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4111551921.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: arrival notice.exe PID: 6552, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6616, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A46596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00A46596
                    Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_00A46A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A46A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets241
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Valid Accounts
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
                    Virtualization/Sandbox Evasion
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                    Access Token Manipulation
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                    Process Injection
                    /etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    arrival notice.exe68%ReversingLabsWin32.Spyware.Negasteal
                    arrival notice.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://mail.mahesh-ent.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    172.67.74.152
                    truefalse
                      unknown
                      mail.mahesh-ent.com
                      148.66.136.151
                      truetrue
                        unknown
                        171.39.242.20.in-addr.arpa
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                          • URL Reputation: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://mail.mahesh-ent.comRegSvcs.exe, 00000001.00000002.4111551921.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000003202000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000303A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000307F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.000000000319A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000003346000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000002F2F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.ipify.orgarrival notice.exe, 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://account.dyn.com/arrival notice.exe, 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4111551921.0000000002E21000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          148.66.136.151
                          mail.mahesh-ent.comSingapore
                          26496AS-26496-GO-DADDY-COM-LLCUStrue
                          172.67.74.152
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1466048
                          Start date and time:2024-07-02 13:15:04 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 54s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:arrival notice.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@3/4@4/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 57
                          • Number of non-executed functions: 268
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: arrival notice.exe
                          TimeTypeDescription
                          07:15:55API Interceptor9656911x Sleep call for process: RegSvcs.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          148.66.136.151LOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                            SOA.exeGet hashmaliciousAgentTeslaBrowse
                              loading advice.exeGet hashmaliciousAgentTeslaBrowse
                                loading advice..exeGet hashmaliciousAgentTeslaBrowse
                                  Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                    Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                      SecuriteInfo.com.Trojan.PackedNET.2926.9666.23696.exeGet hashmaliciousAgentTeslaBrowse
                                        SALES CONTRACT (DRAFT).exeGet hashmaliciousAgentTeslaBrowse
                                          Drawing and specification.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Win32.PWSX-gen.12840.10064.exeGet hashmaliciousAgentTeslaBrowse
                                              172.67.74.152242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                              • api.ipify.org/?format=wef
                                              K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              stub.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              stub.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                              • api.ipify.org/?format=json
                                              Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/?format=json
                                              Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/?format=json
                                              Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                              • api.ipify.org/?format=json
                                              Sky-Beta.exeGet hashmaliciousStealitBrowse
                                              • api.ipify.org/?format=json
                                              SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/?format=json
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              mail.mahesh-ent.comLOADING ADVICE.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              SOA.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              loading advice.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              loading advice..exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              Order of CTS-SFCS-104.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              SecuriteInfo.com.Trojan.PackedNET.2926.9666.23696.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              SALES CONTRACT (DRAFT).exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              Drawing and specification.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              SecuriteInfo.com.Win32.PWSX-gen.12840.10064.exeGet hashmaliciousAgentTeslaBrowse
                                              • 148.66.136.151
                                              api.ipify.orgFmQx1Fw3VA.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 104.26.12.205
                                              config.lnk.mal.lnkGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 172.67.74.152
                                              purchase order - PO-011024-201.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              3z5nZg91qJ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                              • 172.67.74.152
                                              DHL AWB COMMERCAIL INVOICE AND TRACKNG DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                              • 104.26.13.205
                                              https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
                                              • 104.26.12.205
                                              GkYUK8VCrO.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.12.205
                                              PO 4500005168 NIKOLA.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              AS-26496-GO-DADDY-COM-LLCUSZiraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                              • 107.180.58.64
                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                              • 107.180.58.64
                                              16bfcGvz5N.elfGet hashmaliciousUnknownBrowse
                                              • 166.62.3.68
                                              Att0027592.exeGet hashmaliciousFormBookBrowse
                                              • 198.12.241.35
                                              SR9qYL1hLF.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 132.148.33.153
                                              V7UaNBrX72.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 192.169.229.193
                                              EGR7RZv5Km.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 50.62.6.1
                                              sIfZJVVv1H.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 203.124.108.14
                                              SecuriteInfo.com.Adware.Downware.20552.29919.24444.exeGet hashmaliciousUnknownBrowse
                                              • 50.62.141.182
                                              https://rise.articulate.com/share/vLZgmwdxTzgMOCn_-MA-jGPDyLrctYHZ#/lessons/p6UGeUbHB_wy5dP4j7VOwig0Q_8I9BvdGet hashmaliciousHTMLPhisherBrowse
                                              • 72.167.86.209
                                              CLOUDFLARENETUShttps://www.aspcp.ukGet hashmaliciousUnknownBrowse
                                              • 104.16.160.145
                                              https://scanner.topsec.com/?d=3744&r=auto&u=https%3A%2F%2Fmaknastudio.com%2Fpkyos&t=a4fe2e96fe6815a71cc8a7f1ae1196e6fbcf1f08Get hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              FmQx1Fw3VA.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 104.26.12.205
                                              config.lnk.mal.lnkGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                              • 172.67.74.152
                                              IF10339.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                              • 188.114.97.3
                                              https://m.exactag.com/ai.aspx?tc=d9608989bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253APGI.medamax.com.ar/index.xml%23?email=b2xpdmVyLnNjaHVzdGVyQHZvc3Nsb2guY29tGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              email.emlGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.2.184
                                              http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDVF8pkc6E-2BTQqwl0-2BRvTDTzQ4xwNmtM8jgWtHhs5lct2mHJvh-2BnfCyHKSgf3QO5YLChbkkZfUthc-2FSlTYRp6ULk4nieUsDKQjQY0ARP1r-2F9grE5R9p-2F4TBXst454YdngqN4csGWrwqWEO-2BJbI3YRp-2Fg-3DkRbc_BoXxesOKw3fVSpVy-2BC2PPQHPKjgFcP87T3onqy0I5SBy6osQQ2xcKyQ69Dfv99zYbpWutixX8bIeidfkYaH4FEzfwCP1XNNT2viTHdTTsqkPAkJDIo2c-2FqiqOAGGJlXcwCsuL3xNAHFNFK3QDwE9v7VlwdAECafqaCNzpVXKcgwAulkP99wOuMpg-2FMtqy-2BF0DGse8UAhz4oSLXx-2FTt4hXQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                              • 188.114.96.3
                                              purchase order - PO-011024-201.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              http://go.sparkpostmail1.com/f/a/Qy8XDQJtpeYlkqMezh3Eeg~~/AAVXmQA~/RgRnyyJSP0ROaHR0cHM6Ly9pbnN0LmZlYmFmZWRlcmFsYmVuZWZpdHMuY29tL2x0LzExMjU4OTk5MjgxNjc1MTgvcDY2V19yYmFkYk9LaS02NE9GOGJZVwNzcGNCCmXi0u7pZXh5I2VSE2p1ZHkuY2FzdHJvQGJlcC5nb3ZYBAAAAAA~Get hashmaliciousUnknownBrowse
                                              • 188.114.97.3
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0einvoicepast.pdf.lnk.mal.lnkGet hashmaliciousScreenConnect ToolBrowse
                                              • 172.67.74.152
                                              Invoice-UPS-218931.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              IF10339.pdf.lnk.mal.lnkGet hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2faagt%2damx%2dmoodle%2dmex.com%2freport%2finsights%2faction.php%3faction%3duseful%26forwardurl%3dhttps%253A%252F%252Faagt%2damx%2dmoodle%2dmex.com%252Freport%252Finsights%252Fdone.php%253Factionvisiblename%253D%2525C3%25259Atil%2526target%253D%5fblank%26predictionid%3d1580&umid=dfe32622-5afa-43d1-bc88-1d0d19378d86&auth=b37f34d438b54d6822929a8430f2a42f374caac4-c52e46d07bf23779234fc7b6680559fd6de91ad8Get hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              http://wiki.hoeron.com/doku.php?id=hoeron:kb:hardware:fortinet:2023-11-29-1701246124Get hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              purchase order - PO-011024-201.exeGet hashmaliciousAgentTeslaBrowse
                                              • 172.67.74.152
                                              https://scanner.topsec.com/?d=3744&r=auto&u=https%3A%2F%2Fmaknastudio.com%2Fpkyos&t=a4fe2e96fe6815a71cc8a7f1ae1196e6fbcf1f08Get hashmaliciousHTMLPhisherBrowse
                                              • 172.67.74.152
                                              https://scanner.topsec.com/?d=3744&r=auto&u=https%3A%2F%2Fmaknastudio.com%2Fpkyos&t=a4fe2e96fe6815a71cc8a7f1ae1196e6fbcf1f08Get hashmaliciousHTMLPhisherBrowse
                                              • 172.67.74.152
                                              3z5nZg91qJ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CxFHH8i5A3U7lzl-2BTzhlR6ei7mav1762I-2BKvT-2Fk6a5kJfjpj9RJPK9q48Ck5mSzSlgwV-2BsscO5sphM5t-2BVSr5yuCYcPokWOxF7VJFLVcuGxe55FXxdx2OWqy1uhpoEHKlprCsCZc7-2FzwTpK7gWkfISgE1dm3DNZag7jRcJoAY96XjRqTOiYZpVCYj4WczYZatXIFKlGImVUX-2BtzacIIXUkQ-3D-3Dxdxc_PRiWw-2BWerOwUL-2FYAA-2FiwxOm-2BJW3ubqhGFJ5iVqhmG217gfj9KgzNOSRNluvFvYbWIHUd-2ByAsKYpybXBhPgqT-2F1WfaNjyxdi-2FNqxuKfkiep8TocNXSydFj2bAYBLtB5MEDItgpH6g-2FV3171HTXrzYHtaSp7MB2B8WILdzxuyybTMsChhP3QdW9m4oU0X1zagLaXiyfnb7qkeR5CYT3FajfA-3D-3DGet hashmaliciousUnknownBrowse
                                              • 172.67.74.152
                                              No context
                                              Process:C:\Users\user\Desktop\arrival notice.exe
                                              File Type:ASCII text, with very long lines (28756), with no line terminators
                                              Category:dropped
                                              Size (bytes):28756
                                              Entropy (8bit):3.586637471205671
                                              Encrypted:false
                                              SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbd+IH6B34vfF3if6gyCZ:miTZ+2QoioGRk6ZklputwjpjBkCiw2RG
                                              MD5:92CFC5C15AD8088363A8D66B243AC46E
                                              SHA1:7E9459170F7129A3DBD7028177973A184A79A563
                                              SHA-256:FE3B8BAB1CAC58840914D7CBAF4CCDEFD263C1AF028C3AB5939DA16F9D0AFAE1
                                              SHA-512:6442F5048D4109160204E69CD484BF9742EC2F3AD79C48D3F7BAE63093B23E19503D280178BA3AFCCAD610D3730DA0B89095D16DC9CF0AD6DEC0EC342FB7ED1B
                                              Malicious:false
                                              Reputation:low
                                              Preview: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
                                              Process:C:\Users\user\Desktop\arrival notice.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):144770
                                              Entropy (8bit):7.740899336372646
                                              Encrypted:false
                                              SSDEEP:3072:UC6ljmFWtcwseIr+DFkn9nfoeHOiAXTBF4qXTU:UCdapkn93bADBSqA
                                              MD5:E3CAC147EFF4452CFBD6E7C5F77C88DA
                                              SHA1:8B48C34622F79BD9649AA61860931ECF923DC30F
                                              SHA-256:C9200C71438D6EA298DC5F7A996BFFAC33C8EE4B82B34BBCB38D14A4F68A85DC
                                              SHA-512:3D272D4FE4232D7A2B087DDF5489632B2D6B359DED90EFB7860AE36311E6382D90BEB8429DE02F38C66AEED05C63C988BCB6F2CC1F2BDB5B4D382BFBD42F133D
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06......x.Z]joP.P..}.6.N.M..Z@.....(3*.:p.!........&.U...gn?../...I.4K..u5.H.2...A\.Hi.y...(.O.....}.......W.V.....\..X%niP.Dl....j+SZ.n.\..s.:t.~..v..G.....L.@..*. ..aP.O.$3T...^.E.V.(1C.D9s....H...4z=.D......k...>. .x<....Qh. .P....@R@.;X..! ...M.S.......h.....T...=a.T%.j,.o+..".p.... L@........V.....e+.Tj....3.T(........@fU.`...........U.Z4U*-r.6.T.....H.....3%..7........i.9.6..th..D.....a...GC..4.8..#..`t.j=[.q..)W..[Y....>F.=.Tt...c.h.W&....s..Lvu^.....p...V.J..?.&..Tly........m].$.C...6..[.Omr.U.y5.A$.z..O......e...0.~.F....k3.u../...[..2K(...]......`.Ee.R.`E...p..V..&......../.....@.......8.A....H..w.z^c^.!Yt]+.......+.w...Hs.........hvn.2..)..L.....{..>.c{...........f5J.*.3../..f.....`....#...{.........Y...9.......t).p...Z..:.............M....uW.....nM5.G.q[..}J.J.p1C..(.J...A.V#.:...m..aT...]P.0*R..^.E...7...9-...;^..0.M.....)T._...j.:..T...Go.U.3.....Q.r....u........Af.....@.C..i..wI._o...^...R.............n.M.TX...F.U..9m.....(u.
                                              Process:C:\Users\user\Desktop\arrival notice.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):9806
                                              Entropy (8bit):7.603110129007482
                                              Encrypted:false
                                              SSDEEP:192:65jwEiqEH1WgUJuzJkecGgJo7xocBk2SZQoeQ1POjXb6cJN8dN:I6qEHYV0eecGGo7xocBe5b8XbHe
                                              MD5:F1205E9FC6CEE975D2EE5C8A87A93907
                                              SHA1:8C13596E5961526A78D3F01756E2250998577A03
                                              SHA-256:5D3CE3A24A5728341195DD158007BCCB3BC4B13BBE3E9031314E7B11D339C04F
                                              SHA-512:6E71F83DA8B5802C56F848AEADB800F15C189D4B1C7455B7F6E44EA0D49FCA7B9DA4D3B5CC82695B8F5E5E10C08FFE473620E7ABB0D1811852364119096246E2
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..pT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                                              Process:C:\Users\user\Desktop\arrival notice.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):242688
                                              Entropy (8bit):6.570799154072773
                                              Encrypted:false
                                              SSDEEP:6144:0F65OQQUx9PVpijFkpowxi46GOhs6w4LcfKqa3stjSi:0UUQQYZVpijGpowT6GOe6LcZakj5
                                              MD5:7F5AF8F258D0B927D8084F21B81C83A3
                                              SHA1:CDE424C833BC60D5861D424E7F2DD2BC0121C49E
                                              SHA-256:B1F0935FEEEE2B08138E328045170BBAE28C05D981BB78562AF387BDB8A02BEC
                                              SHA-512:F5144E216F10344FC1EBE4EE0F29A4EE399626EA35B4333C726B8D8235DFA1E40FD86E200DF86B25510A6E0AB312818F943554641D04D632C4B6EAD5D40D8B2F
                                              Malicious:false
                                              Reputation:low
                                              Preview:um.EKZ7PTBWG..PN.7PEHZ7P.BWGA2PN87PEHZ7PPBWGA2PN87PEHZ7PPBWG.2PN6(.KH.>.q.V....&QDp5:5P"1/w$ \>!L.2 h(B>p+9g.}.nUX4 fW:ZtBWGA2PNhrPE.[4P..d!A2PN87PE.Z5Q[C\GA.SN8?PEHZ7P.TGA.PN8.SEHZwPPbWGA0PN<7PEHZ7PTBWGA2PN8.TEHX7PPBWGC2..87@EHJ7PPBGGA"PN87PEXZ7PPBWGA2PN\.SE.Z7PP.TG.7PN87PEHZ7PPBWGA2PN87TEDZ7PPBWGA2PN87PEHZ7PPBWGA2PN87PEHZ7PPBWGA2PN87PEHZ7PPbWGI2PN87PEHZ7PXbWG.2PN87PEHZ7P~62?52PN..SEHz7PP.TGA0PN87PEHZ7PPBWGa2P..E#7+Z7P.GWGA.SN81PEH.4PPBWGA2PN87PE.Z7.~02+.QPN47PEHZ3PP@WGA.SN87PEHZ7PPBWG.2P.87PEHZ7PPBWGA2PN..SEHZ7P.BWGC2UNh.RE\n6PSBWG@2PH87PEHZ7PPBWGA2PN87PEHZ7PPBWGA2PN87PEHZ7PPBWGA2PN%......n.?iM#5.h.P.F..$..;..NsE.C#...:....fGV.q7.Jx...Y...G.F=NQ....h"\6OZ.9.81.U....v3.y.HV.*...Ib.,Qc.....s...{_$....F..[X=k)*G<5l.&'S"'.5.DHZ7P.......QO..eY8NdP/....%(.....BWG%2PNJ7PE)Z7P.BWG.2PNV7PE6Z7P.BWG.2PNx7PE.Z7PuBWG,2PN.7PE6Z7P.?XH..'K..EHZ7Pe..w._..h.r..f!.).#....S....2..M?.6q....^.1{.G.<Ab|.I91T@J]3S\.Y...o:3T@J]3S\.Y...o...q...!...H.287PEHZ.PP.WGA..N.7PE.Z.P..WGA..N.7.E..P
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):6.955935024271252
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:arrival notice.exe
                                              File size:1'267'712 bytes
                                              MD5:3ed45724ae4635f06eb3be7ca4fe97af
                                              SHA1:f255198b567d8aee91f08335760e06db43de42aa
                                              SHA256:ce69c0e4efa80c87b672f5fe7ec35808b24d05a1feffba954720e8a801a8acac
                                              SHA512:913b44bd57d342355b95b2202986bcd051d8ab10bdf43a1f7ad37954cbb585174500dc9b7daffefa93da059ccc7975d9f5c811a4b41533640da6b2171551fae7
                                              SSDEEP:24576:KAHnh+eWsN3skA4RV1Hom2KXMmHa0/6nnjqKoeps0okl9M6trQuEba5:dh+ZkldoPK8YaTjqKoepsLTFU
                                              TLSH:E445AE037780C079FFAB91B35B16E24067BDAC7A8127951F13982A7ABDB05B1163D723
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                              Icon Hash:73191a131b1f736e
                                              Entrypoint:0x42800a
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x668340F6 [Mon Jul 1 23:51:18 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                              Instruction
                                              call 00007F276D06F44Dh
                                              jmp 00007F276D062204h
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              int3
                                              push edi
                                              push esi
                                              mov esi, dword ptr [esp+10h]
                                              mov ecx, dword ptr [esp+14h]
                                              mov edi, dword ptr [esp+0Ch]
                                              mov eax, ecx
                                              mov edx, ecx
                                              add eax, esi
                                              cmp edi, esi
                                              jbe 00007F276D06238Ah
                                              cmp edi, eax
                                              jc 00007F276D0626EEh
                                              bt dword ptr [004C41FCh], 01h
                                              jnc 00007F276D062389h
                                              rep movsb
                                              jmp 00007F276D06269Ch
                                              cmp ecx, 00000080h
                                              jc 00007F276D062554h
                                              mov eax, edi
                                              xor eax, esi
                                              test eax, 0000000Fh
                                              jne 00007F276D062390h
                                              bt dword ptr [004BF324h], 01h
                                              jc 00007F276D062860h
                                              bt dword ptr [004C41FCh], 00000000h
                                              jnc 00007F276D06252Dh
                                              test edi, 00000003h
                                              jne 00007F276D06253Eh
                                              test esi, 00000003h
                                              jne 00007F276D06251Dh
                                              bt edi, 02h
                                              jnc 00007F276D06238Fh
                                              mov eax, dword ptr [esi]
                                              sub ecx, 04h
                                              lea esi, dword ptr [esi+04h]
                                              mov dword ptr [edi], eax
                                              lea edi, dword ptr [edi+04h]
                                              bt edi, 03h
                                              jnc 00007F276D062393h
                                              movq xmm1, qword ptr [esi]
                                              sub ecx, 08h
                                              lea esi, dword ptr [esi+08h]
                                              movq qword ptr [edi], xmm1
                                              lea edi, dword ptr [edi+08h]
                                              test esi, 00000007h
                                              je 00007F276D0623E5h
                                              bt esi, 03h
                                              Programming Language:
                                              • [ASM] VS2013 build 21005
                                              • [ C ] VS2013 build 21005
                                              • [C++] VS2013 build 21005
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              • [ASM] VS2013 UPD5 build 40629
                                              • [RES] VS2013 build 21005
                                              • [LNK] VS2013 UPD5 build 40629
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x6b18c.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1340000x7134.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xc80000x6b18c0x6b20022afbea2bb019bacdf5d8ebdcc6932f2False0.6708289272170361data7.221288929834148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x1340000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xc86c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xc87f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xc89180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xc8a400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.5671641791044776
                                              RT_ICON0xc98e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.6624548736462094
                                              RT_ICON0xca1900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishGreat Britain0.6036866359447005
                                              RT_ICON0xca8580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.47760115606936415
                                              RT_ICON0xcadc00x64c1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9930989028030861
                                              RT_ICON0xd12840x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishGreat Britain0.1848456169407311
                                              RT_ICON0xe1aac0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishGreat Britain0.3375551818372924
                                              RT_ICON0xeaf540x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishGreat Britain0.34515037593984965
                                              RT_ICON0xf173c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishGreat Britain0.3652033271719039
                                              RT_ICON0xf6bc40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.3302432687765706
                                              RT_ICON0xfadec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.49813278008298756
                                              RT_ICON0xfd3940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.5572232645403377
                                              RT_ICON0xfe43c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishGreat Britain0.7163934426229508
                                              RT_ICON0xfedc40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7562056737588653
                                              RT_MENU0xff22c0x50dataEnglishGreat Britain0.9
                                              RT_STRING0xff27c0x594dataEnglishGreat Britain0.3333333333333333
                                              RT_STRING0xff8100x68adataEnglishGreat Britain0.2747909199522103
                                              RT_STRING0xffe9c0x490dataEnglishGreat Britain0.3715753424657534
                                              RT_STRING0x10032c0x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0x1009280x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0x100f840x466dataEnglishGreat Britain0.3605683836589698
                                              RT_STRING0x1013ec0x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                              RT_RCDATA0x1015440x31674data1.000350866789223
                                              RT_GROUP_ICON0x132bb80xcadataEnglishGreat Britain0.6683168316831684
                                              RT_GROUP_ICON0x132c840x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x132c980x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x132cac0x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x132cc00xdcdataEnglishGreat Britain0.6181818181818182
                                              RT_MANIFEST0x132d9c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                              DLLImport
                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                              PSAPI.DLLGetProcessMemoryInfo
                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                              UxTheme.dllIsThemeActive
                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              07/02/24-13:19:43.921924TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M258453587192.168.2.4148.66.136.151
                                              07/02/24-13:19:32.752876TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil58452587192.168.2.4148.66.136.151
                                              07/02/24-13:16:00.574256TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249731587192.168.2.4148.66.136.151
                                              07/02/24-13:18:08.376508TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity58443587192.168.2.4148.66.136.151
                                              07/02/24-13:18:38.860424TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M258447587192.168.2.4148.66.136.151
                                              07/02/24-13:18:38.860181TCP2030171ET TROJAN AgentTesla Exfil Via SMTP58447587192.168.2.4148.66.136.151
                                              07/02/24-13:19:43.919056TCP2030171ET TROJAN AgentTesla Exfil Via SMTP58453587192.168.2.4148.66.136.151
                                              07/02/24-13:16:00.574200TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49731587192.168.2.4148.66.136.151
                                              07/02/24-13:17:50.363623TCP2030171ET TROJAN AgentTesla Exfil Via SMTP58441587192.168.2.4148.66.136.151
                                              07/02/24-13:18:08.376543TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M258443587192.168.2.4148.66.136.151
                                              07/02/24-13:17:50.363642TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity58441587192.168.2.4148.66.136.151
                                              07/02/24-13:19:43.919056TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil58453587192.168.2.4148.66.136.151
                                              07/02/24-13:18:08.376466TCP2030171ET TROJAN AgentTesla Exfil Via SMTP58443587192.168.2.4148.66.136.151
                                              07/02/24-13:18:38.860321TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil58447587192.168.2.4148.66.136.151
                                              07/02/24-13:16:00.574256TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49731587192.168.2.4148.66.136.151
                                              07/02/24-13:17:50.363686TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M258441587192.168.2.4148.66.136.151
                                              07/02/24-13:19:32.752837TCP2030171ET TROJAN AgentTesla Exfil Via SMTP58452587192.168.2.4148.66.136.151
                                              07/02/24-13:19:32.752876TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity58452587192.168.2.4148.66.136.151
                                              07/02/24-13:16:00.574256TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49731587192.168.2.4148.66.136.151
                                              07/02/24-13:16:00.574256TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49731587192.168.2.4148.66.136.151
                                              07/02/24-13:18:08.376508TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil58443587192.168.2.4148.66.136.151
                                              07/02/24-13:19:43.919056TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity58453587192.168.2.4148.66.136.151
                                              07/02/24-13:18:38.860321TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity58447587192.168.2.4148.66.136.151
                                              07/02/24-13:19:32.752963TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M258452587192.168.2.4148.66.136.151
                                              07/02/24-13:17:50.363642TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil58441587192.168.2.4148.66.136.151
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 2, 2024 13:15:54.489873886 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:54.489948988 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:54.490031004 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:54.499809980 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:54.499876022 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:54.977726936 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:54.977817059 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:55.049144983 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:55.049181938 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:55.049473047 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:55.100583076 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:55.430769920 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:55.476492882 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:55.540448904 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:55.540522099 CEST44349730172.67.74.152192.168.2.4
                                              Jul 2, 2024 13:15:55.540721893 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:55.618992090 CEST49730443192.168.2.4172.67.74.152
                                              Jul 2, 2024 13:15:56.573632002 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:56.578532934 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:56.578596115 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:57.952403069 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:57.952622890 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:57.957384109 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:58.465684891 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:58.503066063 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:58.507975101 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:58.853722095 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:58.863758087 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:59.099636078 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:59.099685907 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:59.100871086 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:59.462419987 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:59.463687897 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:59.468487024 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:59.812216043 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:15:59.812500000 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:15:59.817234993 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.224934101 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.225099087 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:16:00.229882956 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.573653936 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.574199915 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:16:00.574255943 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:16:00.574275970 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:16:00.574297905 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:16:00.581527948 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.581548929 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.583715916 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:00.583726883 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:08.508141994 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:16:08.553741932 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:36.569644928 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:36.574438095 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:37.125201941 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:37.125351906 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:37.125349998 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:37.125423908 CEST49731587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:37.132864952 CEST58749731148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:47.450650930 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:47.455547094 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:47.455761909 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:48.305284023 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:48.305423975 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:48.310286999 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:48.640779972 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:48.640958071 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:48.645797968 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:48.976320982 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:48.976577997 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:48.981343031 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:49.317924976 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:49.318754911 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:49.323477983 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:49.653537035 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:49.653749943 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:49.658621073 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.026819944 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.026962042 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.031789064 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.362313032 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.363567114 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.363622904 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.363641977 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.363686085 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.365065098 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.368391991 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.368596077 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.368604898 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.368614912 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.368653059 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.369803905 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.369853020 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.369918108 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.369932890 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.369940996 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.369945049 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.369961023 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.369990110 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.370026112 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.370034933 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.370071888 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.370166063 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.370182037 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.370207071 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.370225906 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.373456955 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.373502970 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.374617100 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374659061 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.374672890 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374708891 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.374778986 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374824047 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.374877930 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374917984 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.374952078 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374967098 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.374996901 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.375020027 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.375057936 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.375067949 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.375102043 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.375114918 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.375143051 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.375232935 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.375277996 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.378456116 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.378518105 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.379560947 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379576921 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379614115 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.379631042 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.379637957 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379683971 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.379795074 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379803896 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379812956 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379846096 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:50.379884958 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.379940987 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380006075 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380033016 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380048037 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380147934 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380156040 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380162954 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380171061 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380178928 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380187035 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380194902 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380202055 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380255938 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380264044 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380271912 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380279064 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.380285978 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.383301973 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.383413076 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.383455992 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.383464098 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384469986 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384478092 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384491920 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384502888 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384510040 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384541035 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384550095 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384557009 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384563923 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384583950 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384593964 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384601116 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384609938 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384660959 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:50.384715080 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:51.305624008 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:51.358813047 CEST58442587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:51.515002012 CEST58758442148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:51.515017986 CEST58758441148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:51.515192986 CEST58441587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:51.515192986 CEST58442587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:52.429682016 CEST58758442148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:52.429975033 CEST58758442148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:17:52.430020094 CEST58442587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:52.435740948 CEST58442587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:17:52.443217039 CEST58758442148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:05.217192888 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:05.223448038 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:05.225095034 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:06.133253098 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:06.133519888 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:06.138406038 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:06.483870983 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:06.484155893 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:06.488945961 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:06.890506029 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:06.892909050 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:06.898027897 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:07.258297920 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:07.259251118 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:07.264095068 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:07.613781929 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:07.621807098 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:07.626638889 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.023377895 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.023529053 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.028311014 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.373920918 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.376339912 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.376466036 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.376507998 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.376543045 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.377979994 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.381534100 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.381551027 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.381565094 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.381573915 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.381625891 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.383441925 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.383451939 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.383467913 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.383500099 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.383524895 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.386460066 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386470079 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386486053 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386497974 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386506081 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.386509895 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386522055 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.386540890 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.386554956 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.386591911 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.387037039 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.387305975 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.388390064 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.388446093 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.388554096 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.388566017 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.388580084 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.388597965 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.388633013 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.392080069 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392091036 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392107964 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392153025 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.392204046 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392251968 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.392344952 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392396927 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.392493010 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.392539978 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.393182039 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.393238068 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.393557072 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.393610954 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.393953085 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.393965006 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.394043922 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.395080090 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.395088911 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.395104885 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.395133018 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.397633076 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.397769928 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.397783041 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.397794008 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398379087 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398387909 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398406029 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398413897 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398427963 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398437023 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398452997 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398463964 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398477077 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398488998 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398500919 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398526907 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398539066 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398554087 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398562908 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398578882 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398591995 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.398606062 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.399050951 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.399519920 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.399532080 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.399569988 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400146008 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400156021 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400158882 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400162935 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400166035 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400171041 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400312901 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400325060 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:08.400418043 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:08.405615091 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:12.758641958 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:12.786998987 CEST58758443148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:12.790812969 CEST58443587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:12.810648918 CEST58444587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:12.815666914 CEST58758444148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:12.818792105 CEST58444587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:13.722073078 CEST58758444148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:13.722249031 CEST58758444148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:13.722300053 CEST58444587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:13.722439051 CEST58444587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:13.727185965 CEST58758444148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:14.135740042 CEST58445587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:14.141062975 CEST58758445148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:14.141132116 CEST58445587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:15.044183016 CEST58758445148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:15.044446945 CEST58758445148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:15.045351028 CEST58445587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:15.048978090 CEST58445587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:15.053915024 CEST58758445148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:19.274276018 CEST58446587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:19.279225111 CEST58758446148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:19.279321909 CEST58446587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:20.221935034 CEST58758446148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:20.221947908 CEST58758446148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:20.221954107 CEST58758446148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:20.222022057 CEST58446587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:20.222040892 CEST58446587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:20.222210884 CEST58446587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:20.227098942 CEST58758446148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:35.353437901 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:35.358387947 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:35.358452082 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:36.462376118 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:36.462769032 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:36.463644028 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:36.466753006 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:36.467864990 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:36.806294918 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:36.806457996 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:36.811289072 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:37.421561003 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:37.421909094 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:37.421957970 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:37.422003031 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:37.426870108 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:37.774101019 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:37.780750990 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:37.786082983 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.126039028 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.126233101 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.131258965 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.505870104 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.506037951 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.510838985 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.859666109 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.860129118 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.860181093 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.860321045 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.860424042 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.862361908 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.866008997 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.866108894 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.866528034 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.866580009 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.866967916 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868864059 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868877888 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868886948 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868895054 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868913889 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868917942 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.868925095 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868933916 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.868963957 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.868989944 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.870264053 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.870307922 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.870366096 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.870404005 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.871455908 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.871505976 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.873878002 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.873892069 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.873939037 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.873950005 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.873981953 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.873995066 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.873995066 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.874047995 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.874147892 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.874157906 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.874166012 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.874207020 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.875202894 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.875255108 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.875508070 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.875560999 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.876492023 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.876543045 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.878757000 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.878815889 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.878854990 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.878901005 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.878901958 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.878952980 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.878966093 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.878998041 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879020929 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:38.879054070 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879065990 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879152060 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879163027 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879206896 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879245043 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879348040 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879358053 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879367113 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.879930973 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.880079031 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.880088091 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.880167961 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.880177021 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.880317926 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.881144047 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.881217003 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.881262064 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.881270885 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.881324053 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883464098 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883563042 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883572102 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883634090 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883651018 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883752108 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883760929 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883806944 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883815050 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883866072 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883874893 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883897066 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883949995 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883958101 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.883961916 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.884056091 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.884066105 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:38.884073019 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:51.772805929 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:51.778587103 CEST58758447148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:51.778672934 CEST58447587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:51.824908018 CEST58448587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:52.846410036 CEST58758448148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:52.848581076 CEST58448587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:54.007971048 CEST58758448148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:54.008047104 CEST58758448148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:54.008086920 CEST58448587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:54.011223078 CEST58448587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:54.016046047 CEST58758448148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:57.856674910 CEST58449587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:57.861514091 CEST58758449148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:57.862719059 CEST58449587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:58.731825113 CEST58758449148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:58.732001066 CEST58758449148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:18:58.732099056 CEST58449587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:58.732168913 CEST58449587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:18:58.737425089 CEST58758449148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:16.342447996 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:16.347562075 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:16.347773075 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.236152887 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.236346006 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.244862080 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.571408033 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.571569920 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.576387882 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.663394928 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.669845104 CEST58758450148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.669900894 CEST58450587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.725406885 CEST58451587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:17.731540918 CEST58758451148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:17.731610060 CEST58451587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:18.598768950 CEST58758451148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:18.598989010 CEST58758451148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:18.600881100 CEST58451587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:18.604729891 CEST58451587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:18.609596968 CEST58758451148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:25.607757092 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:25.612624884 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:25.614818096 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:26.467442036 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:26.467721939 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:26.472496033 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:26.883757114 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:26.888397932 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:26.893464088 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:31.224323988 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:31.224591970 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:31.229614973 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:31.572490931 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:31.572632074 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:31.577528954 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.038327932 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.038481951 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.043443918 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.411041975 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.411209106 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.415963888 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.752470970 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.752758980 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.752836943 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.752876043 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.752963066 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.754386902 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.765939951 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.765954018 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.765971899 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.766017914 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767543077 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767602921 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767642975 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767658949 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767671108 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767698050 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767709017 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767740965 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767750978 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767760038 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767770052 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767779112 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767787933 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.767790079 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767818928 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.767837048 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.773520947 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.773582935 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.773699045 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.773710012 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.773745060 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.773792028 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.773813963 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.773854017 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774036884 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774105072 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774107933 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.774162054 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774172068 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774178028 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.774230957 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.774439096 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774450064 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.774518967 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.778542995 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.778599977 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.778652906 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.778805017 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.778815031 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.778878927 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.778933048 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779042006 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:32.779122114 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779131889 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779196024 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779206038 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779269934 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779341936 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779388905 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779400110 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779407024 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779429913 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779484987 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779556990 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779588938 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779629946 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779678106 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779735088 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779766083 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779818058 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779829025 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.779838085 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.783513069 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.783663034 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.783706903 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.783804893 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.783988953 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784113884 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784157991 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784235001 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784245014 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784279108 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784288883 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784420013 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784429073 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784508944 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784518957 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784567118 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784576893 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784693003 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:32.784703970 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:40.866597891 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:40.871812105 CEST58758452148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:40.871890068 CEST58452587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:40.929533958 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:40.934462070 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:40.934525013 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:41.822902918 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:41.823021889 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:41.828262091 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.162431002 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.162698984 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:42.167706013 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.502815962 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.505227089 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:42.510183096 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.856380939 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:42.858834028 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:42.863717079 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.197216034 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.197397947 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.202423096 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.575424910 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.575603962 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.580424070 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.915930033 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.918992996 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.919055939 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.919055939 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.921924114 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.921924114 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.923950911 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.924010992 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.924022913 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.924194098 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.926750898 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926868916 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926882029 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926892996 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926923037 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926947117 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926955938 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926973104 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.926980019 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.926991940 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.927009106 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.927053928 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.927131891 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.927294970 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.929001093 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.929079056 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.931880951 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.931891918 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.931998014 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932008028 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932019949 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932030916 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932034016 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.932055950 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932080984 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932128906 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.932282925 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.932384968 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.934199095 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.934396029 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.936870098 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.936949968 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937047958 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937108994 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.937151909 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937170982 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.937180996 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.937191963 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937227011 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:19:43.937242985 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937305927 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937385082 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937443972 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937623024 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937633038 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937642097 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937650919 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937669992 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937679052 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937688112 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937705994 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937716007 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937726974 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937752008 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937762022 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937834024 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937844038 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.937853098 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.939250946 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.939265966 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.939276934 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.939357996 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942096949 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942109108 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942118883 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942136049 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942145109 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942154884 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942226887 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942244053 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942275047 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942336082 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942346096 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942354918 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942373037 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942384958 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:43.942416906 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:52.599196911 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:19:52.647730112 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:01.010708094 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:01.016222954 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:01.555083036 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:01.555119038 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:01.555325985 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:01.555325985 CEST58453587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:01.555720091 CEST58454587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:01.560173035 CEST58758453148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:01.560467005 CEST58758454148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:01.560587883 CEST58454587192.168.2.4148.66.136.151
                                              Jul 2, 2024 13:20:02.451948881 CEST58758454148.66.136.151192.168.2.4
                                              Jul 2, 2024 13:20:02.507090092 CEST58454587192.168.2.4148.66.136.151
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 2, 2024 13:15:54.476367950 CEST5051053192.168.2.41.1.1.1
                                              Jul 2, 2024 13:15:54.485613108 CEST53505101.1.1.1192.168.2.4
                                              Jul 2, 2024 13:15:56.552087069 CEST5117753192.168.2.41.1.1.1
                                              Jul 2, 2024 13:15:56.573108912 CEST53511771.1.1.1192.168.2.4
                                              Jul 2, 2024 13:16:16.128660917 CEST53536031.1.1.1192.168.2.4
                                              Jul 2, 2024 13:16:18.108309031 CEST53523441.1.1.1192.168.2.4
                                              Jul 2, 2024 13:16:32.639683962 CEST5359063162.159.36.2192.168.2.4
                                              Jul 2, 2024 13:16:33.126375914 CEST6429753192.168.2.41.1.1.1
                                              Jul 2, 2024 13:16:33.146173954 CEST53642971.1.1.1192.168.2.4
                                              Jul 2, 2024 13:17:47.414628029 CEST5623753192.168.2.41.1.1.1
                                              Jul 2, 2024 13:17:47.448648930 CEST53562371.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jul 2, 2024 13:15:54.476367950 CEST192.168.2.41.1.1.10xa052Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:15:56.552087069 CEST192.168.2.41.1.1.10x8914Standard query (0)mail.mahesh-ent.comA (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:16:33.126375914 CEST192.168.2.41.1.1.10x5f9Standard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                              Jul 2, 2024 13:17:47.414628029 CEST192.168.2.41.1.1.10x4cf2Standard query (0)mail.mahesh-ent.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jul 2, 2024 13:15:54.485613108 CEST1.1.1.1192.168.2.40xa052No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:15:54.485613108 CEST1.1.1.1192.168.2.40xa052No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:15:54.485613108 CEST1.1.1.1192.168.2.40xa052No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:15:56.573108912 CEST1.1.1.1192.168.2.40x8914No error (0)mail.mahesh-ent.com148.66.136.151A (IP address)IN (0x0001)false
                                              Jul 2, 2024 13:16:33.146173954 CEST1.1.1.1192.168.2.40x5f9Name error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                              Jul 2, 2024 13:17:47.448648930 CEST1.1.1.1192.168.2.40x4cf2No error (0)mail.mahesh-ent.com148.66.136.151A (IP address)IN (0x0001)false
                                              • api.ipify.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449730172.67.74.1524436616C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-07-02 11:15:55 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-07-02 11:15:55 UTC211INHTTP/1.1 200 OK
                                              Date: Tue, 02 Jul 2024 11:15:55 GMT
                                              Content-Type: text/plain
                                              Content-Length: 11
                                              Connection: close
                                              Vary: Origin
                                              CF-Cache-Status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 89ce387fcccd7d0c-EWR
                                              2024-07-02 11:15:55 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                              Data Ascii: 8.46.123.33


                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Jul 2, 2024 13:15:57.952403069 CEST58749731148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:15:57 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:15:57.952622890 CEST49731587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:15:58.465684891 CEST58749731148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:15:58.503066063 CEST49731587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:15:58.853722095 CEST58749731148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:15:59.099636078 CEST58749731148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:15:59.462419987 CEST58749731148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:15:59.463687897 CEST49731587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:15:59.812216043 CEST58749731148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:15:59.812500000 CEST49731587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:16:00.224934101 CEST58749731148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:16:00.225099087 CEST49731587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:16:00.573653936 CEST58749731148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:16:00.574297905 CEST49731587192.168.2.4148.66.136.151.
                                              Jul 2, 2024 13:16:08.508141994 CEST58749731148.66.136.151192.168.2.4250 OK id=1sObUO-003Xax-1K
                                              Jul 2, 2024 13:17:36.569644928 CEST49731587192.168.2.4148.66.136.151QUIT
                                              Jul 2, 2024 13:17:37.125201941 CEST58749731148.66.136.151192.168.2.4221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                              Jul 2, 2024 13:17:48.305284023 CEST58758441148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:17:48 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:17:48.305423975 CEST58441587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:17:48.640779972 CEST58758441148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:17:48.640958071 CEST58441587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:17:48.976320982 CEST58758441148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:17:49.317924976 CEST58758441148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:17:49.318754911 CEST58441587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:17:49.653537035 CEST58758441148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:17:49.653749943 CEST58441587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:17:50.026819944 CEST58758441148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:17:50.026962042 CEST58441587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:17:50.362313032 CEST58758441148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:17:52.429682016 CEST58758442148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:18:06.133253098 CEST58758443148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:18:05 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:18:06.133519888 CEST58443587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:18:06.483870983 CEST58758443148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:18:06.484155893 CEST58443587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:18:06.890506029 CEST58758443148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:18:07.258297920 CEST58758443148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:18:07.259251118 CEST58443587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:18:07.613781929 CEST58758443148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:18:07.621807098 CEST58443587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:18:08.023377895 CEST58758443148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:18:08.023529053 CEST58443587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:18:08.373920918 CEST58758443148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:18:08.400418043 CEST58443587192.168.2.4148.66.136.151.
                                              Jul 2, 2024 13:18:13.722073078 CEST58758444148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:18:15.044183016 CEST58758445148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:18:20.221935034 CEST58758446148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:18:36.462376118 CEST58758447148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:18:36 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:18:36.462769032 CEST58447587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:18:36.463644028 CEST58758447148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:18:36 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:18:36.806294918 CEST58758447148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:18:36.806457996 CEST58447587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:18:37.421561003 CEST58758447148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:18:37.421957970 CEST58758447148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:18:37.774101019 CEST58758447148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:18:37.780750990 CEST58447587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:18:38.126039028 CEST58758447148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:18:38.126233101 CEST58447587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:18:38.505870104 CEST58758447148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:18:38.506037951 CEST58447587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:18:38.859666109 CEST58758447148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:18:54.007971048 CEST58758448148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:18:58.731825113 CEST58758449148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:19:17.236152887 CEST58758450148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:19:17 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:19:17.236346006 CEST58450587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:19:17.571408033 CEST58758450148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:19:17.571569920 CEST58450587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:19:18.598768950 CEST58758451148.66.136.151192.168.2.4421 Too many concurrent SMTP connections from this IP address; please try again later.
                                              Jul 2, 2024 13:19:26.467442036 CEST58758452148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:19:26 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:19:26.467721939 CEST58452587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:19:26.883757114 CEST58758452148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:19:26.888397932 CEST58452587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:19:31.224323988 CEST58758452148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:19:31.572490931 CEST58758452148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:19:31.572632074 CEST58452587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:19:32.038327932 CEST58758452148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:19:32.038481951 CEST58452587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:19:32.411041975 CEST58758452148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:19:32.411209106 CEST58452587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:19:32.752470970 CEST58758452148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:19:41.822902918 CEST58758453148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:19:41 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jul 2, 2024 13:19:41.823021889 CEST58453587192.168.2.4148.66.136.151EHLO 760639
                                              Jul 2, 2024 13:19:42.162431002 CEST58758453148.66.136.151192.168.2.4250-sg2plzcpnl505494.prod.sin2.secureserver.net Hello 760639 [8.46.123.33]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jul 2, 2024 13:19:42.162698984 CEST58453587192.168.2.4148.66.136.151AUTH login aW5mb0BtYWhlc2gtZW50LmNvbQ==
                                              Jul 2, 2024 13:19:42.502815962 CEST58758453148.66.136.151192.168.2.4334 UGFzc3dvcmQ6
                                              Jul 2, 2024 13:19:42.856380939 CEST58758453148.66.136.151192.168.2.4235 Authentication succeeded
                                              Jul 2, 2024 13:19:42.858834028 CEST58453587192.168.2.4148.66.136.151MAIL FROM:<info@mahesh-ent.com>
                                              Jul 2, 2024 13:19:43.197216034 CEST58758453148.66.136.151192.168.2.4250 OK
                                              Jul 2, 2024 13:19:43.197397947 CEST58453587192.168.2.4148.66.136.151RCPT TO:<obtxxxtf@gmail.com>
                                              Jul 2, 2024 13:19:43.575424910 CEST58758453148.66.136.151192.168.2.4250 Accepted
                                              Jul 2, 2024 13:19:43.575603962 CEST58453587192.168.2.4148.66.136.151DATA
                                              Jul 2, 2024 13:19:43.915930033 CEST58758453148.66.136.151192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jul 2, 2024 13:19:52.599196911 CEST58758453148.66.136.151192.168.2.4250 OK id=1sObXz-003Zpa-2Q
                                              Jul 2, 2024 13:20:01.010708094 CEST58453587192.168.2.4148.66.136.151QUIT
                                              Jul 2, 2024 13:20:01.555083036 CEST58758453148.66.136.151192.168.2.4221 sg2plzcpnl505494.prod.sin2.secureserver.net closing connection
                                              Jul 2, 2024 13:20:02.451948881 CEST58758454148.66.136.151192.168.2.4220-sg2plzcpnl505494.prod.sin2.secureserver.net ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 04:20:02 -0700
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:07:15:52
                                              Start date:02/07/2024
                                              Path:C:\Users\user\Desktop\arrival notice.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\arrival notice.exe"
                                              Imagebase:0x9d0000
                                              File size:1'267'712 bytes
                                              MD5 hash:3ED45724AE4635F06EB3BE7CA4FE97AF
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1649097610.0000000000B10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:07:15:52
                                              Start date:02/07/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\arrival notice.exe"
                                              Imagebase:0xb80000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4110380759.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4111551921.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4111551921.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:4%
                                                Dynamic/Decrypted Code Coverage:1.3%
                                                Signature Coverage:2.8%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:54
                                                execution_graph 98547 9d107d 98552 9d71eb 98547->98552 98549 9d108c 98583 9f2f80 98549->98583 98553 9d71fb __write_nolock 98552->98553 98586 9d77c7 98553->98586 98557 9d72ba 98598 9f074f 98557->98598 98564 9d77c7 59 API calls 98565 9d72eb 98564->98565 98617 9d7eec 98565->98617 98567 9d72f4 RegOpenKeyExW 98568 a0ecda RegQueryValueExW 98567->98568 98573 9d7316 Mailbox 98567->98573 98569 a0ecf7 98568->98569 98570 a0ed6c RegCloseKey 98568->98570 98621 9f0ff6 98569->98621 98570->98573 98582 a0ed7e _wcscat Mailbox __wsetenvp 98570->98582 98572 a0ed10 98631 9d538e 98572->98631 98573->98549 98576 a0ed38 98634 9d7d2c 98576->98634 98578 9d7b52 59 API calls 98578->98582 98579 a0ed52 98579->98570 98581 9d3f84 59 API calls 98581->98582 98582->98573 98582->98578 98582->98581 98643 9d7f41 98582->98643 98708 9f2e84 98583->98708 98585 9d1096 98587 9f0ff6 Mailbox 59 API calls 98586->98587 98588 9d77e8 98587->98588 98589 9f0ff6 Mailbox 59 API calls 98588->98589 98590 9d72b1 98589->98590 98591 9d4864 98590->98591 98647 a01b90 98591->98647 98594 9d7f41 59 API calls 98595 9d4897 98594->98595 98649 9d48ae 98595->98649 98597 9d48a1 Mailbox 98597->98557 98599 a01b90 __write_nolock 98598->98599 98600 9f075c GetFullPathNameW 98599->98600 98601 9f077e 98600->98601 98602 9d7d2c 59 API calls 98601->98602 98603 9d72c5 98602->98603 98604 9d7e0b 98603->98604 98605 9d7e1f 98604->98605 98606 a0f173 98604->98606 98671 9d7db0 98605->98671 98676 9d8189 98606->98676 98609 9d72d3 98611 9d3f84 98609->98611 98610 a0f17e __wsetenvp _memmove 98612 9d3f92 98611->98612 98616 9d3fb4 _memmove 98611->98616 98615 9f0ff6 Mailbox 59 API calls 98612->98615 98613 9f0ff6 Mailbox 59 API calls 98614 9d3fc8 98613->98614 98614->98564 98615->98616 98616->98613 98618 9d7f06 98617->98618 98620 9d7ef9 98617->98620 98619 9f0ff6 Mailbox 59 API calls 98618->98619 98619->98620 98620->98567 98623 9f0ffe 98621->98623 98624 9f1018 98623->98624 98626 9f101c std::exception::exception 98623->98626 98679 9f594c 98623->98679 98696 9f35e1 DecodePointer 98623->98696 98624->98572 98697 9f87db RaiseException 98626->98697 98628 9f1046 98698 9f8711 58 API calls _free 98628->98698 98630 9f1058 98630->98572 98632 9f0ff6 Mailbox 59 API calls 98631->98632 98633 9d53a0 RegQueryValueExW 98632->98633 98633->98576 98633->98579 98635 9d7d38 __wsetenvp 98634->98635 98636 9d7da5 98634->98636 98638 9d7d4e 98635->98638 98639 9d7d73 98635->98639 98637 9d7e8c 59 API calls 98636->98637 98642 9d7d56 _memmove 98637->98642 98707 9d8087 59 API calls Mailbox 98638->98707 98641 9d8189 59 API calls 98639->98641 98641->98642 98642->98579 98644 9d7f50 __wsetenvp _memmove 98643->98644 98645 9f0ff6 Mailbox 59 API calls 98644->98645 98646 9d7f8e 98645->98646 98646->98582 98648 9d4871 GetModuleFileNameW 98647->98648 98648->98594 98650 a01b90 __write_nolock 98649->98650 98651 9d48bb GetFullPathNameW 98650->98651 98652 9d48da 98651->98652 98653 9d48f7 98651->98653 98654 9d7d2c 59 API calls 98652->98654 98655 9d7eec 59 API calls 98653->98655 98656 9d48e6 98654->98656 98655->98656 98659 9d7886 98656->98659 98660 9d7894 98659->98660 98663 9d7e8c 98660->98663 98662 9d48f2 98662->98597 98664 9d7e9a 98663->98664 98666 9d7ea3 _memmove 98663->98666 98664->98666 98667 9d7faf 98664->98667 98666->98662 98668 9d7fc2 98667->98668 98670 9d7fbf _memmove 98667->98670 98669 9f0ff6 Mailbox 59 API calls 98668->98669 98669->98670 98670->98666 98672 9d7dbf __wsetenvp 98671->98672 98673 9d8189 59 API calls 98672->98673 98674 9d7dd0 _memmove 98672->98674 98675 a0f130 _memmove 98673->98675 98674->98609 98677 9f0ff6 Mailbox 59 API calls 98676->98677 98678 9d8193 98677->98678 98678->98610 98680 9f59c7 98679->98680 98685 9f5958 98679->98685 98705 9f35e1 DecodePointer 98680->98705 98682 9f5963 98682->98685 98699 9fa3ab 58 API calls 2 library calls 98682->98699 98700 9fa408 58 API calls 8 library calls 98682->98700 98701 9f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98682->98701 98683 9f59cd 98706 9f8d68 58 API calls __getptd_noexit 98683->98706 98685->98682 98688 9f598b RtlAllocateHeap 98685->98688 98690 9f59b3 98685->98690 98694 9f59b1 98685->98694 98702 9f35e1 DecodePointer 98685->98702 98687 9f59bf 98687->98623 98688->98685 98688->98687 98703 9f8d68 58 API calls __getptd_noexit 98690->98703 98704 9f8d68 58 API calls __getptd_noexit 98694->98704 98696->98623 98697->98628 98698->98630 98699->98682 98700->98682 98702->98685 98703->98694 98704->98687 98705->98683 98706->98687 98707->98642 98709 9f2e90 __ioinit 98708->98709 98716 9f3457 98709->98716 98715 9f2eb7 __ioinit 98715->98585 98733 9f9e4b 98716->98733 98718 9f2e99 98719 9f2ec8 DecodePointer DecodePointer 98718->98719 98720 9f2ea5 98719->98720 98721 9f2ef5 98719->98721 98730 9f2ec2 98720->98730 98721->98720 98779 9f89e4 59 API calls _xtow_s@20 98721->98779 98723 9f2f58 EncodePointer EncodePointer 98723->98720 98724 9f2f07 98724->98723 98725 9f2f2c 98724->98725 98780 9f8aa4 61 API calls __realloc_crt 98724->98780 98725->98720 98728 9f2f46 EncodePointer 98725->98728 98781 9f8aa4 61 API calls __realloc_crt 98725->98781 98728->98723 98729 9f2f40 98729->98720 98729->98728 98782 9f3460 98730->98782 98734 9f9e6f EnterCriticalSection 98733->98734 98735 9f9e5c 98733->98735 98734->98718 98740 9f9ed3 98735->98740 98737 9f9e62 98737->98734 98764 9f32f5 58 API calls 3 library calls 98737->98764 98741 9f9edf __ioinit 98740->98741 98742 9f9ee8 98741->98742 98743 9f9f00 98741->98743 98765 9fa3ab 58 API calls 2 library calls 98742->98765 98752 9f9f21 __ioinit 98743->98752 98768 9f8a5d 58 API calls 2 library calls 98743->98768 98745 9f9eed 98766 9fa408 58 API calls 8 library calls 98745->98766 98748 9f9f15 98750 9f9f1c 98748->98750 98751 9f9f2b 98748->98751 98749 9f9ef4 98767 9f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98749->98767 98769 9f8d68 58 API calls __getptd_noexit 98750->98769 98753 9f9e4b __lock 58 API calls 98751->98753 98752->98737 98756 9f9f32 98753->98756 98758 9f9f3f 98756->98758 98759 9f9f57 98756->98759 98770 9fa06b InitializeCriticalSectionAndSpinCount 98758->98770 98771 9f2f95 98759->98771 98762 9f9f4b 98777 9f9f73 LeaveCriticalSection _doexit 98762->98777 98765->98745 98766->98749 98768->98748 98769->98752 98770->98762 98772 9f2f9e RtlFreeHeap 98771->98772 98776 9f2fc7 _free 98771->98776 98773 9f2fb3 98772->98773 98772->98776 98778 9f8d68 58 API calls __getptd_noexit 98773->98778 98775 9f2fb9 GetLastError 98775->98776 98776->98762 98777->98752 98778->98775 98779->98724 98780->98725 98781->98729 98785 9f9fb5 LeaveCriticalSection 98782->98785 98784 9f2ec7 98784->98715 98785->98784 98786 99295b 98789 9925d0 98786->98789 98788 9929a7 98802 990000 98789->98802 98792 9926a0 CreateFileW 98793 99266f 98792->98793 98799 9926ad 98792->98799 98794 9926c9 VirtualAlloc 98793->98794 98793->98799 98800 9927d0 FindCloseChangeNotification 98793->98800 98801 9927e0 VirtualFree 98793->98801 98805 9934e0 GetPEB 98793->98805 98795 9926ea ReadFile 98794->98795 98794->98799 98796 992708 VirtualAlloc 98795->98796 98795->98799 98796->98793 98796->98799 98797 9928ca 98797->98788 98798 9928bc VirtualFree 98798->98797 98799->98797 98799->98798 98800->98793 98801->98793 98807 993480 GetPEB 98802->98807 98804 99068b 98804->98793 98806 99350a 98805->98806 98806->98792 98808 9934aa 98807->98808 98808->98804 98809 9de70b 98812 9dd260 98809->98812 98811 9de719 98813 9dd27d 98812->98813 98814 9dd4dd 98812->98814 98815 a12abb 98813->98815 98816 a12b0a 98813->98816 98845 9dd2a4 98813->98845 98827 9dd6ab 98814->98827 98892 a3a0b5 89 API calls 4 library calls 98814->98892 98819 a12ad9 98815->98819 98820 a12abe 98815->98820 98883 a4a6fb 341 API calls __cinit 98816->98883 98819->98814 98882 a4b1b7 341 API calls 3 library calls 98819->98882 98821 a12aca 98820->98821 98820->98845 98881 a4ad0f 341 API calls 98821->98881 98822 9f2f80 __cinit 67 API calls 98822->98845 98825 9dd594 98875 9d8bb2 68 API calls 98825->98875 98826 a12cdf 98826->98826 98827->98811 98831 9dd5a3 98831->98811 98832 a12c26 98891 a4aa66 89 API calls 98832->98891 98845->98814 98845->98822 98845->98825 98845->98827 98845->98832 98846 9da000 98845->98846 98869 9d88a0 68 API calls __cinit 98845->98869 98870 9d86a2 68 API calls 98845->98870 98871 9d8620 98845->98871 98876 9d859a 68 API calls 98845->98876 98877 9dd0dc 341 API calls 98845->98877 98878 9d9f3a 59 API calls Mailbox 98845->98878 98879 9dd060 89 API calls 98845->98879 98880 9dcedd 341 API calls 98845->98880 98884 9d8bb2 68 API calls 98845->98884 98885 9d9e9c 60 API calls Mailbox 98845->98885 98886 a26d03 60 API calls 98845->98886 98887 9d81a7 98845->98887 98847 9da01f 98846->98847 98863 9da04d Mailbox 98846->98863 98848 9f0ff6 Mailbox 59 API calls 98847->98848 98848->98863 98849 9db5d5 98850 9d81a7 59 API calls 98849->98850 98864 9da1b7 98850->98864 98851 a27405 59 API calls 98851->98863 98852 9f0ff6 59 API calls Mailbox 98852->98863 98855 9f2f80 67 API calls __cinit 98855->98863 98856 9d81a7 59 API calls 98856->98863 98857 a1047f 98895 a3a0b5 89 API calls 4 library calls 98857->98895 98859 9d77c7 59 API calls 98859->98863 98862 a1048e 98862->98845 98863->98849 98863->98851 98863->98852 98863->98855 98863->98856 98863->98857 98863->98859 98863->98864 98865 a10e00 98863->98865 98867 9da6ba 98863->98867 98868 9db5da 98863->98868 98893 9dca20 341 API calls 2 library calls 98863->98893 98894 9dba60 60 API calls Mailbox 98863->98894 98864->98845 98897 a3a0b5 89 API calls 4 library calls 98865->98897 98896 a3a0b5 89 API calls 4 library calls 98867->98896 98898 a3a0b5 89 API calls 4 library calls 98868->98898 98869->98845 98870->98845 98872 9d862b 98871->98872 98873 9d8652 98872->98873 98899 9d8b13 69 API calls Mailbox 98872->98899 98873->98845 98875->98831 98876->98845 98877->98845 98878->98845 98879->98845 98880->98845 98881->98827 98882->98814 98883->98845 98884->98845 98885->98845 98886->98845 98888 9d81ba 98887->98888 98889 9d81b2 98887->98889 98888->98845 98900 9d80d7 59 API calls 2 library calls 98889->98900 98891->98814 98892->98826 98893->98863 98894->98863 98895->98862 98896->98864 98897->98868 98898->98864 98899->98873 98900->98888 98901 a0ff06 98902 a0ff10 98901->98902 98907 9dac90 Mailbox _memmove 98901->98907 99196 9d8e34 59 API calls Mailbox 98902->99196 98905 9db685 99201 a3a0b5 89 API calls 4 library calls 98905->99201 98907->98905 98910 9da097 Mailbox 98907->98910 98915 9da1b7 98907->98915 98919 9d7f41 59 API calls 98907->98919 98934 9f0ff6 59 API calls Mailbox 98907->98934 98935 9db416 98907->98935 98937 9da000 341 API calls 98907->98937 98938 a10c94 98907->98938 98940 a10ca2 98907->98940 98943 9db37c 98907->98943 98950 9dade2 Mailbox 98907->98950 99109 a4c5f4 98907->99109 99141 a37be0 98907->99141 99147 a4bf80 98907->99147 99187 a266f4 98907->99187 99197 a27405 59 API calls 98907->99197 99198 a4c4a7 85 API calls 2 library calls 98907->99198 98908 9f0ff6 59 API calls Mailbox 98908->98910 98910->98908 98912 9db5d5 98910->98912 98914 9db5da 98910->98914 98910->98915 98917 a1047f 98910->98917 98920 9d77c7 59 API calls 98910->98920 98922 9d81a7 59 API calls 98910->98922 98926 a27405 59 API calls 98910->98926 98928 a10e00 98910->98928 98929 9f2f80 67 API calls __cinit 98910->98929 98933 9da6ba 98910->98933 99190 9dca20 341 API calls 2 library calls 98910->99190 99191 9dba60 60 API calls Mailbox 98910->99191 98916 9d81a7 59 API calls 98912->98916 99206 a3a0b5 89 API calls 4 library calls 98914->99206 98916->98915 99200 a3a0b5 89 API calls 4 library calls 98917->99200 98919->98907 98920->98910 98922->98910 98924 a1048e 98926->98910 98927 a266f4 Mailbox 59 API calls 98927->98915 99205 a3a0b5 89 API calls 4 library calls 98928->99205 98929->98910 99204 a3a0b5 89 API calls 4 library calls 98933->99204 98934->98907 99195 9df803 341 API calls 98935->99195 98937->98907 99202 9d9df0 59 API calls Mailbox 98938->99202 99203 a3a0b5 89 API calls 4 library calls 98940->99203 98942 a10c86 98942->98915 98942->98927 99193 9d9e9c 60 API calls Mailbox 98943->99193 98945 9db38d 99194 9d9e9c 60 API calls Mailbox 98945->99194 98950->98905 98950->98915 98950->98942 98951 a100e0 VariantClear 98950->98951 98958 a5251d 98950->98958 98963 a3d2e5 98950->98963 99010 9e2123 98950->99010 99050 a4474d 98950->99050 99059 a3d2e6 98950->99059 99106 a4e237 98950->99106 99192 9d9df0 59 API calls Mailbox 98950->99192 99199 a27405 59 API calls 98950->99199 98951->98950 99207 a2f8f2 98958->99207 98960 a52529 99226 9d9b9c 59 API calls Mailbox 98960->99226 98962 a52545 Mailbox 98962->98950 98964 a3d310 98963->98964 98965 a3d305 98963->98965 98967 a3d3ea Mailbox 98964->98967 98970 9d77c7 59 API calls 98964->98970 99303 9d9c9c 59 API calls 98965->99303 98968 9f0ff6 Mailbox 59 API calls 98967->98968 99006 a3d3f3 Mailbox 98967->99006 98969 a3d433 98968->98969 98971 a3d43f 98969->98971 99360 9d5906 60 API calls Mailbox 98969->99360 98972 a3d334 98970->98972 99272 9d9997 98971->99272 98974 9d77c7 59 API calls 98972->98974 98976 a3d33d 98974->98976 98978 9d9997 84 API calls 98976->98978 98980 a3d349 98978->98980 99304 9d46f9 98980->99304 98983 a3d46a GetLastError 98987 a3d483 98983->98987 98984 a3d49e 98989 a3d500 98984->98989 98990 a3d4c9 98984->98990 98985 a3d35e 98986 9d7c8e 59 API calls 98985->98986 98988 a3d391 98986->98988 98987->99006 99361 9d5a1a CloseHandle 98987->99361 98991 a3d3e3 98988->98991 99355 a33e73 98988->99355 98992 9f0ff6 Mailbox 59 API calls 98989->98992 98993 9f0ff6 Mailbox 59 API calls 98990->98993 99359 9d9c9c 59 API calls 98991->99359 98997 a3d505 98992->98997 98998 a3d4ce 98993->98998 99002 9d77c7 59 API calls 98997->99002 98997->99006 99000 a3d4df 98998->99000 99003 9d77c7 59 API calls 98998->99003 99362 a3f835 59 API calls 2 library calls 99000->99362 99001 a3d3a5 99005 9d7f41 59 API calls 99001->99005 99002->99006 99003->99000 99007 a3d3b2 99005->99007 99006->98950 99358 a33c66 63 API calls Mailbox 99007->99358 99009 a3d3bb Mailbox 99009->98991 99426 9d9bf8 99010->99426 99013 9f0ff6 Mailbox 59 API calls 99015 9e2154 99013->99015 99016 9e2164 99015->99016 99454 9d5906 60 API calls Mailbox 99015->99454 99020 9d9997 84 API calls 99016->99020 99017 9e2189 99025 9e2196 99017->99025 99459 9d9c9c 59 API calls 99017->99459 99018 a169af 99018->99017 99458 a3f7df 59 API calls 99018->99458 99022 9e2172 99020->99022 99024 9d5956 67 API calls 99022->99024 99023 a169f7 99023->99025 99026 a169ff 99023->99026 99027 9e2181 99024->99027 99029 9d5e3f 2 API calls 99025->99029 99460 9d9c9c 59 API calls 99026->99460 99027->99017 99027->99018 99457 9d5a1a CloseHandle 99027->99457 99031 9e219d 99029->99031 99032 a16a11 99031->99032 99033 9e21b7 99031->99033 99035 9f0ff6 Mailbox 59 API calls 99032->99035 99034 9d77c7 59 API calls 99033->99034 99036 9e21bf 99034->99036 99037 a16a17 99035->99037 99439 9d56d2 99036->99439 99039 a16a2b 99037->99039 99461 9d59b0 ReadFile SetFilePointerEx 99037->99461 99044 a16a2f _memmove 99039->99044 99462 a3794e 59 API calls 2 library calls 99039->99462 99041 9e21ce 99041->99044 99455 9d9b9c 59 API calls Mailbox 99041->99455 99045 9e221c 99045->98950 99046 9e21e2 Mailbox 99046->99045 99047 9d5dcf CloseHandle 99046->99047 99048 9e2210 99047->99048 99048->99045 99456 9d5a1a CloseHandle 99048->99456 99051 9d9997 84 API calls 99050->99051 99052 a44787 99051->99052 99486 9d63a0 99052->99486 99054 a44797 99055 a447bc 99054->99055 99056 9da000 341 API calls 99054->99056 99057 9d9bf8 59 API calls 99055->99057 99058 a447c0 99055->99058 99056->99055 99057->99058 99058->98950 99060 a3d305 99059->99060 99062 a3d310 99059->99062 99525 9d9c9c 59 API calls 99060->99525 99063 a3d3ea Mailbox 99062->99063 99066 9d77c7 59 API calls 99062->99066 99064 9f0ff6 Mailbox 59 API calls 99063->99064 99102 a3d3f3 Mailbox 99063->99102 99065 a3d433 99064->99065 99067 a3d43f 99065->99067 99528 9d5906 60 API calls Mailbox 99065->99528 99068 a3d334 99066->99068 99071 9d9997 84 API calls 99067->99071 99070 9d77c7 59 API calls 99068->99070 99072 a3d33d 99070->99072 99073 a3d457 99071->99073 99074 9d9997 84 API calls 99072->99074 99075 9d5956 67 API calls 99073->99075 99076 a3d349 99074->99076 99077 a3d466 99075->99077 99078 9d46f9 59 API calls 99076->99078 99079 a3d46a GetLastError 99077->99079 99080 a3d49e 99077->99080 99081 a3d35e 99078->99081 99083 a3d483 99079->99083 99085 a3d500 99080->99085 99086 a3d4c9 99080->99086 99082 9d7c8e 59 API calls 99081->99082 99084 a3d391 99082->99084 99083->99102 99529 9d5a1a CloseHandle 99083->99529 99087 a3d3e3 99084->99087 99092 a33e73 3 API calls 99084->99092 99088 9f0ff6 Mailbox 59 API calls 99085->99088 99089 9f0ff6 Mailbox 59 API calls 99086->99089 99527 9d9c9c 59 API calls 99087->99527 99093 a3d505 99088->99093 99094 a3d4ce 99089->99094 99095 a3d3a1 99092->99095 99098 9d77c7 59 API calls 99093->99098 99093->99102 99096 a3d4df 99094->99096 99099 9d77c7 59 API calls 99094->99099 99095->99087 99097 a3d3a5 99095->99097 99530 a3f835 59 API calls 2 library calls 99096->99530 99101 9d7f41 59 API calls 99097->99101 99098->99102 99099->99096 99103 a3d3b2 99101->99103 99102->98950 99526 a33c66 63 API calls Mailbox 99103->99526 99105 a3d3bb Mailbox 99105->99087 99531 a4cdf1 99106->99531 99108 a4e247 99108->98950 99110 9d77c7 59 API calls 99109->99110 99111 a4c608 99110->99111 99112 9d77c7 59 API calls 99111->99112 99113 a4c610 99112->99113 99114 9d77c7 59 API calls 99113->99114 99115 a4c618 99114->99115 99116 9d9997 84 API calls 99115->99116 99127 a4c626 99116->99127 99117 9d7d2c 59 API calls 99117->99127 99118 a4c83c Mailbox 99118->98907 99120 a4c7f6 99121 9d7e0b 59 API calls 99120->99121 99124 a4c803 99121->99124 99122 9d7a84 59 API calls 99122->99127 99123 a4c811 99125 9d7e0b 59 API calls 99123->99125 99129 9d7c8e 59 API calls 99124->99129 99130 a4c820 99125->99130 99126 9d81a7 59 API calls 99126->99127 99127->99117 99127->99118 99127->99120 99127->99122 99127->99123 99127->99126 99128 9d7faf 59 API calls 99127->99128 99131 9d7faf 59 API calls 99127->99131 99133 a4c80f 99127->99133 99138 9d9997 84 API calls 99127->99138 99139 9d7c8e 59 API calls 99127->99139 99140 9d7e0b 59 API calls 99127->99140 99132 a4c6bd CharUpperBuffW 99128->99132 99129->99133 99134 9d7c8e 59 API calls 99130->99134 99135 a4c77d CharUpperBuffW 99131->99135 99633 9d859a 68 API calls 99132->99633 99133->99118 99635 9d9b9c 59 API calls Mailbox 99133->99635 99134->99133 99634 9dc707 69 API calls 2 library calls 99135->99634 99138->99127 99139->99127 99140->99127 99142 a37bec 99141->99142 99143 9f0ff6 Mailbox 59 API calls 99142->99143 99144 a37bfa 99143->99144 99145 a37c08 99144->99145 99146 9d77c7 59 API calls 99144->99146 99145->98907 99146->99145 99148 a4bfc5 99147->99148 99149 a4bfab 99147->99149 99637 a4a528 59 API calls Mailbox 99148->99637 99636 a3a0b5 89 API calls 4 library calls 99149->99636 99152 a4bfd0 99153 9da000 340 API calls 99152->99153 99154 a4c031 99153->99154 99155 a4c0c3 99154->99155 99159 a4c072 99154->99159 99186 a4bfbd Mailbox 99154->99186 99156 a4c119 99155->99156 99157 a4c0c9 99155->99157 99158 9d9997 84 API calls 99156->99158 99156->99186 99658 a37ba4 59 API calls 99157->99658 99160 a4c12b 99158->99160 99638 a37581 59 API calls Mailbox 99159->99638 99162 9d7faf 59 API calls 99160->99162 99165 a4c14f CharUpperBuffW 99162->99165 99163 a4c0ec 99659 9d5ea1 59 API calls Mailbox 99163->99659 99170 a4c169 99165->99170 99167 a4c0a2 99639 9df5c0 99167->99639 99168 a4c0f4 Mailbox 99660 9dfe40 341 API calls 2 library calls 99168->99660 99171 a4c170 99170->99171 99172 a4c1bc 99170->99172 99661 a37581 59 API calls Mailbox 99171->99661 99173 9d9997 84 API calls 99172->99173 99175 a4c1c4 99173->99175 99662 9d9fbd 60 API calls 99175->99662 99178 a4c19e 99179 9df5c0 340 API calls 99178->99179 99179->99186 99180 a4c1ce 99181 9d9997 84 API calls 99180->99181 99180->99186 99182 a4c1e9 99181->99182 99663 9d5ea1 59 API calls Mailbox 99182->99663 99184 a4c1f9 99664 9dfe40 341 API calls 2 library calls 99184->99664 99186->98907 100729 a26636 99187->100729 99189 a26702 99189->98907 99190->98910 99191->98910 99192->98950 99193->98945 99194->98935 99195->98905 99196->98907 99197->98907 99198->98907 99199->98950 99200->98924 99201->98942 99202->98942 99203->98942 99204->98915 99205->98914 99206->98915 99208 9d77c7 59 API calls 99207->99208 99209 a2f905 99208->99209 99227 9d7b76 99209->99227 99213 a2f658 61 API calls 99223 a2f93b 99213->99223 99215 a2f9b5 99218 9d79ab 59 API calls 99215->99218 99217 9d79ab 59 API calls 99217->99223 99219 a2f9ce 99218->99219 99252 9d7c8e 99219->99252 99220 9d7c8e 59 API calls 99220->99223 99223->99213 99223->99215 99223->99217 99223->99220 99225 a2f9e9 Mailbox 99225->98960 99226->98962 99228 9f0ff6 Mailbox 59 API calls 99227->99228 99229 9d7b9b 99228->99229 99230 9d8189 59 API calls 99229->99230 99231 9d7baa 99230->99231 99231->99223 99232 a2f658 99231->99232 99234 a2f683 __wsetenvp 99232->99234 99233 a2f6c2 99233->99223 99239 9d79ab 99233->99239 99234->99233 99235 a2f769 99234->99235 99236 a2f6b8 99234->99236 99235->99233 99263 9d7a24 61 API calls 99235->99263 99236->99233 99262 9d7a24 61 API calls 99236->99262 99240 9d79ba 99239->99240 99241 9d7a17 99239->99241 99240->99241 99243 9d79c5 99240->99243 99242 9d7e8c 59 API calls 99241->99242 99249 9d79e8 _memmove 99242->99249 99244 a0ef32 99243->99244 99245 9d79e0 99243->99245 99246 9d8189 59 API calls 99244->99246 99264 9d8087 59 API calls Mailbox 99245->99264 99248 a0ef3c 99246->99248 99250 9f0ff6 Mailbox 59 API calls 99248->99250 99249->99223 99251 a0ef5c 99250->99251 99253 a0f094 99252->99253 99254 9d7ca0 99252->99254 99271 a28123 59 API calls _memmove 99253->99271 99265 9d7bb1 99254->99265 99257 9d7cac 99257->99225 99261 9d80d7 59 API calls 2 library calls 99257->99261 99258 a0f09e 99259 9d81a7 59 API calls 99258->99259 99260 a0f0a6 Mailbox 99259->99260 99261->99225 99262->99236 99263->99235 99264->99249 99266 9d7bbf 99265->99266 99270 9d7be5 _memmove 99265->99270 99267 9f0ff6 Mailbox 59 API calls 99266->99267 99266->99270 99268 9d7c34 99267->99268 99269 9f0ff6 Mailbox 59 API calls 99268->99269 99269->99270 99270->99257 99271->99258 99273 9d99ab 99272->99273 99274 9d99b1 99272->99274 99290 9d5956 99273->99290 99275 a0f9fc __i64tow 99274->99275 99276 9d99f9 99274->99276 99278 9d99b7 __itow 99274->99278 99281 a0f903 99274->99281 99363 9f38d8 83 API calls 3 library calls 99276->99363 99280 9f0ff6 Mailbox 59 API calls 99278->99280 99282 9d99d1 99280->99282 99283 a0f97b Mailbox _wcscpy 99281->99283 99285 9f0ff6 Mailbox 59 API calls 99281->99285 99282->99273 99284 9d7f41 59 API calls 99282->99284 99364 9f38d8 83 API calls 3 library calls 99283->99364 99284->99273 99286 a0f948 99285->99286 99287 9f0ff6 Mailbox 59 API calls 99286->99287 99288 a0f96e 99287->99288 99288->99283 99289 9d7f41 59 API calls 99288->99289 99289->99283 99365 9d5dcf 99290->99365 99294 9d59a4 99294->98983 99294->98984 99295 9d5981 99295->99294 99377 9d5770 99295->99377 99297 9d5993 99394 9d53db SetFilePointerEx SetFilePointerEx 99297->99394 99299 a0e030 99395 a33696 SetFilePointerEx SetFilePointerEx WriteFile 99299->99395 99300 9d599a 99300->99294 99300->99299 99302 a0e060 99302->99294 99303->98964 99305 9d77c7 59 API calls 99304->99305 99306 9d470f 99305->99306 99307 9d77c7 59 API calls 99306->99307 99308 9d4717 99307->99308 99309 9d77c7 59 API calls 99308->99309 99310 9d471f 99309->99310 99311 9d77c7 59 API calls 99310->99311 99312 9d4727 99311->99312 99313 9d475b 99312->99313 99314 a0d8fb 99312->99314 99315 9d79ab 59 API calls 99313->99315 99316 9d81a7 59 API calls 99314->99316 99317 9d4769 99315->99317 99318 a0d904 99316->99318 99319 9d7e8c 59 API calls 99317->99319 99320 9d7eec 59 API calls 99318->99320 99321 9d4773 99319->99321 99323 9d479e 99320->99323 99322 9d79ab 59 API calls 99321->99322 99321->99323 99326 9d4794 99322->99326 99324 9d47de 99323->99324 99327 9d47bd 99323->99327 99337 a0d924 99323->99337 99325 9d79ab 59 API calls 99324->99325 99328 9d47ef 99325->99328 99329 9d7e8c 59 API calls 99326->99329 99418 9d7b52 99327->99418 99332 9d4801 99328->99332 99335 9d81a7 59 API calls 99328->99335 99329->99323 99330 a0d9f4 99333 9d7d2c 59 API calls 99330->99333 99336 9d4811 99332->99336 99338 9d81a7 59 API calls 99332->99338 99350 a0d9b1 99333->99350 99335->99332 99340 9d4818 99336->99340 99342 9d81a7 59 API calls 99336->99342 99337->99330 99339 a0d9dd 99337->99339 99349 a0d95b 99337->99349 99338->99336 99339->99330 99345 a0d9c8 99339->99345 99343 9d81a7 59 API calls 99340->99343 99352 9d481f Mailbox 99340->99352 99341 9d79ab 59 API calls 99341->99324 99342->99340 99343->99352 99344 9d7b52 59 API calls 99344->99350 99348 9d7d2c 59 API calls 99345->99348 99346 a0d9b9 99347 9d7d2c 59 API calls 99346->99347 99347->99350 99348->99350 99349->99346 99353 a0d9a4 99349->99353 99350->99324 99350->99344 99421 9d7a84 59 API calls 2 library calls 99350->99421 99352->98985 99354 9d7d2c 59 API calls 99353->99354 99354->99350 99422 a34696 GetFileAttributesW 99355->99422 99358->99009 99359->98967 99360->98971 99361->99006 99362->99006 99363->99278 99364->99275 99366 9d5962 99365->99366 99367 9d5de8 99365->99367 99369 9d5df9 99366->99369 99367->99366 99368 9d5ded CloseHandle 99367->99368 99368->99366 99370 a0e181 99369->99370 99371 9d5e12 CreateFileW 99369->99371 99372 9d5e34 99370->99372 99373 a0e187 CreateFileW 99370->99373 99371->99372 99372->99295 99373->99372 99374 a0e1ad 99373->99374 99396 9d5c4e 99374->99396 99378 9d578b 99377->99378 99379 a0dfce 99377->99379 99380 9d5c4e 2 API calls 99378->99380 99393 9d581a 99378->99393 99379->99393 99412 9d5e3f 99379->99412 99381 9d57ad 99380->99381 99383 9d538e 59 API calls 99381->99383 99384 9d57b7 99383->99384 99384->99379 99385 9d57c4 99384->99385 99386 9f0ff6 Mailbox 59 API calls 99385->99386 99387 9d57cf 99386->99387 99388 9d538e 59 API calls 99387->99388 99389 9d57da 99388->99389 99406 9d5d20 99389->99406 99392 9d5c4e 2 API calls 99392->99393 99393->99297 99394->99300 99395->99302 99403 9d5c68 99396->99403 99397 9d5cef SetFilePointerEx 99404 9d5dae SetFilePointerEx 99397->99404 99398 a0e151 99405 9d5dae SetFilePointerEx 99398->99405 99401 9d5cc3 99401->99372 99402 a0e16b 99403->99397 99403->99398 99403->99401 99404->99401 99405->99402 99407 9d5d93 99406->99407 99411 9d5d2e 99406->99411 99417 9d5dae SetFilePointerEx 99407->99417 99409 9d5807 99409->99392 99410 9d5d66 ReadFile 99410->99409 99410->99411 99411->99409 99411->99410 99413 9d5c4e 2 API calls 99412->99413 99414 9d5e60 99413->99414 99415 9d5c4e 2 API calls 99414->99415 99416 9d5e74 99415->99416 99416->99393 99417->99411 99419 9d7faf 59 API calls 99418->99419 99420 9d47c7 99419->99420 99420->99324 99420->99341 99421->99350 99423 a33e7a 99422->99423 99424 a346b1 FindFirstFileW 99422->99424 99423->98991 99423->99001 99424->99423 99425 a346c6 FindClose 99424->99425 99425->99423 99428 a0fbff 99426->99428 99430 9d9c08 99426->99430 99427 a0fc10 99429 9d7eec 59 API calls 99427->99429 99428->99427 99431 9d7d2c 59 API calls 99428->99431 99432 a0fc1a 99429->99432 99433 9f0ff6 Mailbox 59 API calls 99430->99433 99431->99427 99436 9d9c34 99432->99436 99437 9d77c7 59 API calls 99432->99437 99434 9d9c1b 99433->99434 99434->99432 99435 9d9c26 99434->99435 99435->99436 99438 9d7f41 59 API calls 99435->99438 99436->99013 99436->99018 99437->99436 99438->99436 99440 9d56dd 99439->99440 99441 9d5702 99439->99441 99440->99441 99445 9d56ec 99440->99445 99442 9d7eec 59 API calls 99441->99442 99446 a3349a 99442->99446 99443 a334c9 99443->99041 99465 9d5c18 99445->99465 99446->99443 99463 a33436 ReadFile SetFilePointerEx 99446->99463 99464 9d7a84 59 API calls 2 library calls 99446->99464 99453 a335d8 Mailbox 99453->99041 99454->99016 99455->99046 99456->99045 99457->99018 99458->99018 99459->99023 99460->99031 99461->99039 99462->99044 99463->99446 99464->99446 99466 9f0ff6 Mailbox 59 API calls 99465->99466 99467 9d5c2b 99466->99467 99468 9f0ff6 Mailbox 59 API calls 99467->99468 99469 9d5c37 99468->99469 99470 9d5632 99469->99470 99477 9d5a2f 99470->99477 99472 9d5674 99472->99453 99476 9d793a 61 API calls Mailbox 99472->99476 99473 9d5d20 2 API calls 99474 9d5643 99473->99474 99474->99472 99474->99473 99484 9d5bda 59 API calls 2 library calls 99474->99484 99476->99453 99478 a0e065 99477->99478 99479 9d5a40 99477->99479 99485 a26443 59 API calls Mailbox 99478->99485 99479->99474 99481 a0e06f 99482 9f0ff6 Mailbox 59 API calls 99481->99482 99483 a0e07b 99482->99483 99484->99474 99485->99481 99487 9d7b76 59 API calls 99486->99487 99505 9d63c5 99487->99505 99488 9d65ca 99513 9d766f 99488->99513 99490 9d65e4 Mailbox 99490->99054 99493 a0e41f 99523 a2fdba 91 API calls 4 library calls 99493->99523 99496 9d766f 59 API calls 99496->99505 99498 9d7eec 59 API calls 99498->99505 99499 a0e42d 99500 9d766f 59 API calls 99499->99500 99502 a0e443 99500->99502 99501 9d68f9 _memmove 99524 a2fdba 91 API calls 4 library calls 99501->99524 99502->99490 99503 a0e3bb 99504 9d8189 59 API calls 99503->99504 99507 a0e3c6 99504->99507 99505->99488 99505->99493 99505->99496 99505->99498 99505->99501 99505->99503 99508 9d7faf 59 API calls 99505->99508 99511 9d60cc 60 API calls 99505->99511 99512 9d5ea1 59 API calls Mailbox 99505->99512 99521 9d5fd2 60 API calls 99505->99521 99522 9d7a84 59 API calls 2 library calls 99505->99522 99510 9f0ff6 Mailbox 59 API calls 99507->99510 99509 9d659b CharUpperBuffW 99508->99509 99509->99505 99510->99501 99511->99505 99512->99505 99514 9d770f 99513->99514 99515 9d7682 _memmove 99513->99515 99517 9f0ff6 Mailbox 59 API calls 99514->99517 99516 9f0ff6 Mailbox 59 API calls 99515->99516 99519 9d7689 99516->99519 99517->99515 99518 9d76b2 99518->99490 99519->99518 99520 9f0ff6 Mailbox 59 API calls 99519->99520 99520->99518 99521->99505 99522->99505 99523->99499 99524->99490 99525->99062 99526->99105 99527->99063 99528->99067 99529->99102 99530->99102 99532 9d9997 84 API calls 99531->99532 99533 a4ce2e 99532->99533 99538 a4ce75 Mailbox 99533->99538 99569 a4dab9 99533->99569 99535 a4d242 99619 a4dbdc 92 API calls Mailbox 99535->99619 99538->99108 99539 a4cec6 Mailbox 99539->99538 99542 9d9997 84 API calls 99539->99542 99556 a4d0cd 99539->99556 99601 a3f835 59 API calls 2 library calls 99539->99601 99602 a4d2f3 61 API calls 2 library calls 99539->99602 99540 a4d251 99541 a4d0db 99540->99541 99543 a4d25d 99540->99543 99582 a4cc82 99541->99582 99542->99539 99543->99538 99548 a4d114 99597 9f0e48 99548->99597 99551 a4d147 99604 9d942e 99551->99604 99552 a4d12e 99603 a3a0b5 89 API calls 4 library calls 99552->99603 99555 a4d139 GetCurrentProcess TerminateProcess 99555->99551 99556->99535 99556->99541 99561 a4d2b8 99561->99538 99565 a4d2cc FreeLibrary 99561->99565 99562 a4d17f 99616 a4d95d 107 API calls _free 99562->99616 99565->99538 99568 a4d190 99568->99561 99617 9d8ea0 59 API calls Mailbox 99568->99617 99618 9d9e9c 60 API calls Mailbox 99568->99618 99620 a4d95d 107 API calls _free 99568->99620 99570 9d7faf 59 API calls 99569->99570 99571 a4dad4 CharLowerBuffW 99570->99571 99572 a2f658 61 API calls 99571->99572 99573 a4daf5 99572->99573 99575 9d77c7 59 API calls 99573->99575 99580 a4db30 Mailbox 99573->99580 99576 a4db0d 99575->99576 99577 9d79ab 59 API calls 99576->99577 99578 a4db24 99577->99578 99579 9d7e8c 59 API calls 99578->99579 99579->99580 99581 a4db6c Mailbox 99580->99581 99621 a4d2f3 61 API calls 2 library calls 99580->99621 99581->99539 99583 a4cc9d 99582->99583 99587 a4ccf2 99582->99587 99584 9f0ff6 Mailbox 59 API calls 99583->99584 99585 a4ccbf 99584->99585 99586 9f0ff6 Mailbox 59 API calls 99585->99586 99585->99587 99586->99585 99588 a4dd64 99587->99588 99589 a4df8d Mailbox 99588->99589 99596 a4dd87 _strcat _wcscpy __wsetenvp 99588->99596 99589->99548 99590 9d9d46 59 API calls 99590->99596 99591 9d9c9c 59 API calls 99591->99596 99592 9d9cf8 59 API calls 99592->99596 99593 9d9997 84 API calls 99593->99596 99594 9f594c 58 API calls std::exception::_Copy_str 99594->99596 99596->99589 99596->99590 99596->99591 99596->99592 99596->99593 99596->99594 99622 a35b29 61 API calls 2 library calls 99596->99622 99598 9f0e5d 99597->99598 99599 9f0ef5 VirtualAlloc 99598->99599 99600 9f0ec3 99598->99600 99599->99600 99600->99551 99600->99552 99601->99539 99602->99539 99603->99555 99605 9d9436 99604->99605 99606 9f0ff6 Mailbox 59 API calls 99605->99606 99607 9d9444 99606->99607 99608 9d9450 99607->99608 99623 9d935c 59 API calls Mailbox 99607->99623 99610 9d91b0 99608->99610 99624 9d92c0 99610->99624 99612 9f0ff6 Mailbox 59 API calls 99613 9d925b 99612->99613 99613->99568 99615 9d8ea0 59 API calls Mailbox 99613->99615 99614 9d91bf 99614->99612 99614->99613 99615->99562 99616->99568 99617->99568 99618->99568 99619->99540 99620->99568 99621->99581 99622->99596 99623->99608 99625 9d92c9 Mailbox 99624->99625 99626 a0f5c8 99625->99626 99631 9d92d3 99625->99631 99627 9f0ff6 Mailbox 59 API calls 99626->99627 99628 a0f5d4 99627->99628 99629 9d92da 99629->99614 99631->99629 99632 9d9df0 59 API calls Mailbox 99631->99632 99632->99631 99633->99127 99634->99127 99635->99118 99636->99186 99637->99152 99638->99167 99640 9df61a 99639->99640 99641 9df7b0 99639->99641 99642 a14848 99640->99642 99643 9df626 99640->99643 99644 9d7f41 59 API calls 99641->99644 99645 a4bf80 341 API calls 99642->99645 99754 9df3f0 341 API calls 2 library calls 99643->99754 99650 9df6ec Mailbox 99644->99650 99647 a14856 99645->99647 99651 9df790 99647->99651 99756 a3a0b5 89 API calls 4 library calls 99647->99756 99649 9df65d 99649->99647 99649->99650 99649->99651 99653 9df743 99650->99653 99654 a33e73 3 API calls 99650->99654 99665 a3cde5 99650->99665 99745 a4e24b 99650->99745 99748 9d4faa 99650->99748 99651->99186 99653->99651 99755 9d9df0 59 API calls Mailbox 99653->99755 99654->99653 99658->99163 99659->99168 99660->99186 99661->99178 99662->99180 99663->99184 99664->99186 99666 9d77c7 59 API calls 99665->99666 99667 a3ce1a 99666->99667 99668 9d77c7 59 API calls 99667->99668 99669 a3ce23 99668->99669 99670 a3ce37 99669->99670 99890 9d9c9c 59 API calls 99669->99890 99672 9d9997 84 API calls 99670->99672 99673 a3ce54 99672->99673 99674 a3ce76 99673->99674 99675 a3cf55 99673->99675 99681 a3cf85 Mailbox 99673->99681 99677 9d9997 84 API calls 99674->99677 99757 9d4f3d 99675->99757 99679 a3ce82 99677->99679 99680 9d81a7 59 API calls 99679->99680 99686 a3ce8e 99680->99686 99681->99653 99682 9d4f3d 136 API calls 99684 a3cf81 99682->99684 99683 9d77c7 59 API calls 99685 a3cfb6 99683->99685 99684->99681 99684->99683 99687 9d77c7 59 API calls 99685->99687 99688 a3cea2 99686->99688 99689 a3ced4 99686->99689 99690 a3cfbf 99687->99690 99691 9d81a7 59 API calls 99688->99691 99692 9d9997 84 API calls 99689->99692 99693 9d77c7 59 API calls 99690->99693 99695 a3ceb2 99691->99695 99696 a3cee1 99692->99696 99694 a3cfc8 99693->99694 99697 9d77c7 59 API calls 99694->99697 99698 9d7e0b 59 API calls 99695->99698 99699 9d81a7 59 API calls 99696->99699 99701 a3cfd1 99697->99701 99702 a3cebc 99698->99702 99700 a3ceed 99699->99700 99891 a34cd3 GetFileAttributesW 99700->99891 99704 9d9997 84 API calls 99701->99704 99705 9d9997 84 API calls 99702->99705 99707 a3cfde 99704->99707 99708 a3cec8 99705->99708 99706 a3cef6 99709 a3cf09 99706->99709 99712 9d7b52 59 API calls 99706->99712 99710 9d46f9 59 API calls 99707->99710 99711 9d7c8e 59 API calls 99708->99711 99714 9d9997 84 API calls 99709->99714 99720 a3cf0f 99709->99720 99713 a3cff9 99710->99713 99711->99689 99712->99709 99715 9d7b52 59 API calls 99713->99715 99716 a3cf36 99714->99716 99717 a3d008 99715->99717 99892 a33a2b 75 API calls Mailbox 99716->99892 99719 a3d03c 99717->99719 99722 9d7b52 59 API calls 99717->99722 99721 9d81a7 59 API calls 99719->99721 99720->99681 99723 a3d04a 99721->99723 99724 a3d019 99722->99724 99725 9d7c8e 59 API calls 99723->99725 99724->99719 99727 9d7d2c 59 API calls 99724->99727 99726 a3d058 99725->99726 99728 9d7c8e 59 API calls 99726->99728 99729 a3d02e 99727->99729 99730 a3d066 99728->99730 99731 9d7d2c 59 API calls 99729->99731 99732 9d7c8e 59 API calls 99730->99732 99731->99719 99733 a3d074 99732->99733 99734 9d9997 84 API calls 99733->99734 99735 a3d080 99734->99735 99781 a342ad 99735->99781 99737 a3d091 99738 a33e73 3 API calls 99737->99738 99739 a3d09b 99738->99739 99740 9d9997 84 API calls 99739->99740 99744 a3d0cc 99739->99744 99741 a3d0b9 99740->99741 99835 a393df 99741->99835 99743 9d4faa 84 API calls 99743->99681 99744->99743 99746 a4cdf1 130 API calls 99745->99746 99747 a4e25b 99746->99747 99747->99653 99749 9d4fb4 99748->99749 99753 9d4fbb 99748->99753 99750 9f55d6 __fcloseall 83 API calls 99749->99750 99750->99753 99751 9d4fdb FreeLibrary 99752 9d4fca 99751->99752 99752->99653 99753->99751 99753->99752 99754->99649 99755->99653 99756->99651 99893 9d4d13 99757->99893 99762 9d4f68 LoadLibraryExW 99903 9d4cc8 99762->99903 99763 a0dd0f 99764 9d4faa 84 API calls 99763->99764 99766 a0dd16 99764->99766 99768 9d4cc8 3 API calls 99766->99768 99770 a0dd1e 99768->99770 99929 9d506b 99770->99929 99771 9d4f8f 99771->99770 99772 9d4f9b 99771->99772 99773 9d4faa 84 API calls 99772->99773 99775 9d4fa0 99773->99775 99775->99682 99775->99684 99778 a0dd45 99937 9d5027 99778->99937 99782 a342c9 99781->99782 99783 a342ce 99782->99783 99784 a342dc 99782->99784 99785 9d81a7 59 API calls 99783->99785 99786 9d77c7 59 API calls 99784->99786 99787 a342d7 Mailbox 99785->99787 99788 a342e4 99786->99788 99787->99737 99789 9d77c7 59 API calls 99788->99789 99790 a342ec 99789->99790 99791 9d77c7 59 API calls 99790->99791 99792 a342f7 99791->99792 99793 9d77c7 59 API calls 99792->99793 99794 a342ff 99793->99794 99795 9d77c7 59 API calls 99794->99795 99796 a34307 99795->99796 99797 9d77c7 59 API calls 99796->99797 99798 a3430f 99797->99798 99799 9d77c7 59 API calls 99798->99799 99800 a34317 99799->99800 99801 9d77c7 59 API calls 99800->99801 99802 a3431f 99801->99802 99803 9d46f9 59 API calls 99802->99803 99804 a34336 99803->99804 99805 9d46f9 59 API calls 99804->99805 99806 a3434f 99805->99806 99807 9d7b52 59 API calls 99806->99807 99808 a3435b 99807->99808 99809 a3436e 99808->99809 99810 9d7e8c 59 API calls 99808->99810 99811 9d7b52 59 API calls 99809->99811 99810->99809 99812 a34377 99811->99812 99813 a34387 99812->99813 99815 9d7e8c 59 API calls 99812->99815 99814 9d81a7 59 API calls 99813->99814 99816 a34393 99814->99816 99815->99813 99817 9d7c8e 59 API calls 99816->99817 99818 a3439f 99817->99818 100364 a3445f 59 API calls 99818->100364 99820 a343ae 100365 a3445f 59 API calls 99820->100365 99822 a343c1 99823 9d7b52 59 API calls 99822->99823 99824 a343cb 99823->99824 99825 a343e2 99824->99825 99826 a343d0 99824->99826 99828 9d7b52 59 API calls 99825->99828 99827 9d7e0b 59 API calls 99826->99827 99830 a343dd 99827->99830 99829 a343eb 99828->99829 99831 a34409 99829->99831 99832 9d7e0b 59 API calls 99829->99832 99833 9d7c8e 59 API calls 99830->99833 99834 9d7c8e 59 API calls 99831->99834 99832->99830 99833->99831 99834->99787 99836 a393ec __write_nolock 99835->99836 99837 9f0ff6 Mailbox 59 API calls 99836->99837 99838 a39449 99837->99838 99839 9d538e 59 API calls 99838->99839 99840 a39453 99839->99840 99841 a391e9 GetSystemTimeAsFileTime 99840->99841 99842 a3945e 99841->99842 99843 9d5045 85 API calls 99842->99843 99844 a39471 _wcscmp 99843->99844 99845 a39542 99844->99845 99846 a39495 99844->99846 99847 a399be 96 API calls 99845->99847 100396 a399be 99846->100396 99863 a3950e _wcscat 99847->99863 99851 9d506b 74 API calls 99853 a39567 99851->99853 99852 a3954b 99852->99744 99854 9d506b 74 API calls 99853->99854 99856 a39577 99854->99856 99855 a394c3 _wcscat _wcscpy 100403 9f432e 58 API calls __wsplitpath_helper 99855->100403 99857 9d506b 74 API calls 99856->99857 99859 a39592 99857->99859 99860 9d506b 74 API calls 99859->99860 99861 a395a2 99860->99861 99862 9d506b 74 API calls 99861->99862 99864 a395bd 99862->99864 99863->99851 99863->99852 99865 9d506b 74 API calls 99864->99865 99866 a395cd 99865->99866 99867 9d506b 74 API calls 99866->99867 99868 a395dd 99867->99868 99869 9d506b 74 API calls 99868->99869 99870 a395ed 99869->99870 100366 a39b6d GetTempPathW GetTempFileNameW 99870->100366 99872 a395f9 99873 9f548b 115 API calls 99872->99873 99881 a3960a 99873->99881 99875 a396cf 99877 a396d5 DeleteFileW 99875->99877 99878 a396e9 99875->99878 99876 9d506b 74 API calls 99876->99881 99877->99852 99881->99852 99881->99876 99888 a396c4 99881->99888 100367 9f4a93 99881->100367 100380 9f55d6 99888->100380 99890->99670 99891->99706 99892->99720 99942 9d4d61 99893->99942 99896 9d4d3a 99898 9d4d4a FreeLibrary 99896->99898 99899 9d4d53 99896->99899 99897 9d4d61 2 API calls 99897->99896 99898->99899 99900 9f548b 99899->99900 99946 9f54a0 99900->99946 99902 9d4f5c 99902->99762 99902->99763 100104 9d4d94 99903->100104 99906 9d4d94 2 API calls 99909 9d4ced 99906->99909 99907 9d4cff FreeLibrary 99908 9d4d08 99907->99908 99910 9d4dd0 99908->99910 99909->99907 99909->99908 99911 9f0ff6 Mailbox 59 API calls 99910->99911 99912 9d4de5 99911->99912 99913 9d538e 59 API calls 99912->99913 99914 9d4df1 _memmove 99913->99914 99915 9d4ee9 99914->99915 99916 9d4f21 99914->99916 99920 9d4e2c 99914->99920 100108 9d4fe9 CreateStreamOnHGlobal 99915->100108 100119 a39ba5 95 API calls 99916->100119 99917 9d5027 69 API calls 99926 9d4e35 99917->99926 99920->99917 99921 9d506b 74 API calls 99921->99926 99922 9d4ec9 99922->99771 99924 a0dcd0 99925 9d5045 85 API calls 99924->99925 99927 a0dce4 99925->99927 99926->99921 99926->99922 99926->99924 100114 9d5045 99926->100114 99928 9d506b 74 API calls 99927->99928 99928->99922 99930 9d507d 99929->99930 99931 a0ddf6 99929->99931 100143 9f5812 99930->100143 99934 a39393 100341 a391e9 99934->100341 99936 a393a9 99936->99778 99938 9d5036 99937->99938 99941 a0ddb9 99937->99941 100346 9f5e90 99938->100346 99940 9d503e 99943 9d4d2e 99942->99943 99944 9d4d6a LoadLibraryA 99942->99944 99943->99896 99943->99897 99944->99943 99945 9d4d7b GetProcAddress 99944->99945 99945->99943 99948 9f54ac __ioinit 99946->99948 99947 9f54bf 99995 9f8d68 58 API calls __getptd_noexit 99947->99995 99948->99947 99950 9f54f0 99948->99950 99965 a00738 99950->99965 99951 9f54c4 99996 9f8ff6 9 API calls _xtow_s@20 99951->99996 99954 9f54f5 99955 9f54fe 99954->99955 99956 9f550b 99954->99956 99997 9f8d68 58 API calls __getptd_noexit 99955->99997 99958 9f5535 99956->99958 99959 9f5515 99956->99959 99980 a00857 99958->99980 99998 9f8d68 58 API calls __getptd_noexit 99959->99998 99961 9f54cf __ioinit @_EH4_CallFilterFunc@8 99961->99902 99966 a00744 __ioinit 99965->99966 99967 9f9e4b __lock 58 API calls 99966->99967 99968 a00752 99967->99968 99969 a007cd 99968->99969 99976 9f9ed3 __mtinitlocknum 58 API calls 99968->99976 99978 a007c6 99968->99978 100003 9f6e8d 59 API calls __lock 99968->100003 100004 9f6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99968->100004 100005 9f8a5d 58 API calls 2 library calls 99969->100005 99972 a00843 __ioinit 99972->99954 99973 a007d4 99973->99978 100006 9fa06b InitializeCriticalSectionAndSpinCount 99973->100006 99976->99968 99977 a007fa EnterCriticalSection 99977->99978 100000 a0084e 99978->100000 99989 a00877 __wopenfile 99980->99989 99981 a00891 100011 9f8d68 58 API calls __getptd_noexit 99981->100011 99983 a00a4c 99983->99981 99987 a00aaf 99983->99987 99984 a00896 100012 9f8ff6 9 API calls _xtow_s@20 99984->100012 99986 9f5540 99999 9f5562 LeaveCriticalSection LeaveCriticalSection _fseek 99986->99999 100008 a087f1 99987->100008 99989->99981 99989->99983 100013 9f3a0b 60 API calls 2 library calls 99989->100013 99991 a00a45 99991->99983 100014 9f3a0b 60 API calls 2 library calls 99991->100014 99993 a00a64 99993->99983 100015 9f3a0b 60 API calls 2 library calls 99993->100015 99995->99951 99996->99961 99997->99961 99998->99961 99999->99961 100007 9f9fb5 LeaveCriticalSection 100000->100007 100002 a00855 100002->99972 100003->99968 100004->99968 100005->99973 100006->99977 100007->100002 100016 a07fd5 100008->100016 100010 a0880a 100010->99986 100011->99984 100012->99986 100013->99991 100014->99993 100015->99983 100017 a07fe1 __ioinit 100016->100017 100018 a07ff7 100017->100018 100021 a0802d 100017->100021 100101 9f8d68 58 API calls __getptd_noexit 100018->100101 100020 a07ffc 100102 9f8ff6 9 API calls _xtow_s@20 100020->100102 100027 a0809e 100021->100027 100024 a08049 100103 a08072 LeaveCriticalSection __unlock_fhandle 100024->100103 100026 a08006 __ioinit 100026->100010 100028 a080be 100027->100028 100029 9f471a __wsopen_nolock 58 API calls 100028->100029 100033 a080da 100029->100033 100030 9f9006 __invoke_watson 8 API calls 100032 a087f0 100030->100032 100031 a08137 100041 a081f5 100031->100041 100049 a081d3 100031->100049 100035 a07fd5 __wsopen_helper 103 API calls 100032->100035 100033->100031 100034 a08114 100033->100034 100050 a08211 100033->100050 100036 9f8d34 __free_osfhnd 58 API calls 100034->100036 100037 a0880a 100035->100037 100038 a08119 100036->100038 100037->100024 100039 9f8d68 _xtow_s@20 58 API calls 100038->100039 100040 a08126 100039->100040 100042 9f8ff6 _xtow_s@20 9 API calls 100040->100042 100043 9f8d34 __free_osfhnd 58 API calls 100041->100043 100044 a08130 100042->100044 100045 a081fa 100043->100045 100044->100024 100046 9f8d68 _xtow_s@20 58 API calls 100045->100046 100047 a08207 100046->100047 100048 9f8ff6 _xtow_s@20 9 API calls 100047->100048 100048->100050 100051 9fd4d4 __alloc_osfhnd 61 API calls 100049->100051 100050->100030 100052 a082a1 100051->100052 100053 a082ab 100052->100053 100054 a082ce 100052->100054 100056 9f8d34 __free_osfhnd 58 API calls 100053->100056 100055 a07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100054->100055 100065 a082f0 100055->100065 100057 a082b0 100056->100057 100059 9f8d68 _xtow_s@20 58 API calls 100057->100059 100058 a0836e GetFileType 100062 a08379 GetLastError 100058->100062 100063 a083bb 100058->100063 100061 a082ba 100059->100061 100060 a0833c GetLastError 100066 9f8d47 __dosmaperr 58 API calls 100060->100066 100067 9f8d68 _xtow_s@20 58 API calls 100061->100067 100064 9f8d47 __dosmaperr 58 API calls 100062->100064 100073 9fd76a __set_osfhnd 59 API calls 100063->100073 100068 a083a0 CloseHandle 100064->100068 100065->100058 100065->100060 100069 a07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100065->100069 100070 a08361 100066->100070 100067->100044 100068->100070 100071 a083ae 100068->100071 100072 a08331 100069->100072 100075 9f8d68 _xtow_s@20 58 API calls 100070->100075 100074 9f8d68 _xtow_s@20 58 API calls 100071->100074 100072->100058 100072->100060 100078 a083d9 100073->100078 100076 a083b3 100074->100076 100075->100050 100076->100070 100077 a08594 100077->100050 100081 a08767 CloseHandle 100077->100081 100078->100077 100079 a01b11 __lseeki64_nolock 60 API calls 100078->100079 100095 a0845a 100078->100095 100080 a08443 100079->100080 100084 9f8d34 __free_osfhnd 58 API calls 100080->100084 100080->100095 100082 a07f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100081->100082 100083 a0878e 100082->100083 100086 a08796 GetLastError 100083->100086 100087 a087c2 100083->100087 100084->100095 100085 a010ab 70 API calls __read_nolock 100085->100095 100088 9f8d47 __dosmaperr 58 API calls 100086->100088 100087->100050 100089 a087a2 100088->100089 100092 9fd67d __free_osfhnd 59 API calls 100089->100092 100090 a00d2d __close_nolock 61 API calls 100090->100095 100091 a0848c 100093 a099f2 __chsize_nolock 82 API calls 100091->100093 100091->100095 100092->100087 100093->100091 100094 9fdac6 __write 78 API calls 100094->100095 100095->100077 100095->100085 100095->100090 100095->100091 100095->100094 100096 a08611 100095->100096 100097 a01b11 60 API calls __lseeki64_nolock 100095->100097 100098 a00d2d __close_nolock 61 API calls 100096->100098 100097->100095 100099 a08618 100098->100099 100100 9f8d68 _xtow_s@20 58 API calls 100099->100100 100100->100050 100101->100020 100102->100026 100103->100026 100105 9d4ce1 100104->100105 100106 9d4d9d LoadLibraryA 100104->100106 100105->99906 100105->99909 100106->100105 100107 9d4dae GetProcAddress 100106->100107 100107->100105 100109 9d5003 FindResourceExW 100108->100109 100113 9d5020 100108->100113 100110 a0dd5c LoadResource 100109->100110 100109->100113 100111 a0dd71 SizeofResource 100110->100111 100110->100113 100112 a0dd85 LockResource 100111->100112 100111->100113 100112->100113 100113->99920 100115 a0ddd4 100114->100115 100116 9d5054 100114->100116 100120 9f5a7d 100116->100120 100118 9d5062 100118->99926 100119->99920 100121 9f5a89 __ioinit 100120->100121 100122 9f5a9b 100121->100122 100124 9f5ac1 100121->100124 100133 9f8d68 58 API calls __getptd_noexit 100122->100133 100135 9f6e4e 100124->100135 100126 9f5aa0 100134 9f8ff6 9 API calls _xtow_s@20 100126->100134 100130 9f5ad6 100142 9f5af8 LeaveCriticalSection LeaveCriticalSection _fseek 100130->100142 100132 9f5aab __ioinit 100132->100118 100133->100126 100134->100132 100136 9f6e5e 100135->100136 100137 9f6e80 EnterCriticalSection 100135->100137 100136->100137 100138 9f6e66 100136->100138 100139 9f5ac7 100137->100139 100140 9f9e4b __lock 58 API calls 100138->100140 100141 9f59ee 83 API calls 5 library calls 100139->100141 100140->100139 100141->100130 100142->100132 100146 9f582d 100143->100146 100145 9d508e 100145->99934 100147 9f5839 __ioinit 100146->100147 100148 9f587c 100147->100148 100149 9f5874 __ioinit 100147->100149 100151 9f584f _memset 100147->100151 100150 9f6e4e __lock_file 59 API calls 100148->100150 100149->100145 100152 9f5882 100150->100152 100173 9f8d68 58 API calls __getptd_noexit 100151->100173 100159 9f564d 100152->100159 100155 9f5869 100174 9f8ff6 9 API calls _xtow_s@20 100155->100174 100163 9f5668 _memset 100159->100163 100165 9f5683 100159->100165 100160 9f5673 100271 9f8d68 58 API calls __getptd_noexit 100160->100271 100162 9f5678 100272 9f8ff6 9 API calls _xtow_s@20 100162->100272 100163->100160 100163->100165 100167 9f56c3 100163->100167 100175 9f58b6 LeaveCriticalSection LeaveCriticalSection _fseek 100165->100175 100167->100165 100168 9f57d4 _memset 100167->100168 100176 9f4916 100167->100176 100183 a010ab 100167->100183 100251 a00df7 100167->100251 100273 a00f18 58 API calls 3 library calls 100167->100273 100274 9f8d68 58 API calls __getptd_noexit 100168->100274 100173->100155 100174->100149 100175->100149 100177 9f4935 100176->100177 100178 9f4920 100176->100178 100177->100167 100275 9f8d68 58 API calls __getptd_noexit 100178->100275 100180 9f4925 100276 9f8ff6 9 API calls _xtow_s@20 100180->100276 100182 9f4930 100182->100167 100184 a010e3 100183->100184 100185 a010cc 100183->100185 100187 a0181b 100184->100187 100190 a0111d 100184->100190 100286 9f8d34 58 API calls __getptd_noexit 100185->100286 100302 9f8d34 58 API calls __getptd_noexit 100187->100302 100189 a010d1 100287 9f8d68 58 API calls __getptd_noexit 100189->100287 100193 a01125 100190->100193 100200 a0113c 100190->100200 100191 a01820 100303 9f8d68 58 API calls __getptd_noexit 100191->100303 100288 9f8d34 58 API calls __getptd_noexit 100193->100288 100196 a01131 100304 9f8ff6 9 API calls _xtow_s@20 100196->100304 100197 a0112a 100289 9f8d68 58 API calls __getptd_noexit 100197->100289 100199 a01151 100290 9f8d34 58 API calls __getptd_noexit 100199->100290 100200->100199 100203 a0116b 100200->100203 100204 a01189 100200->100204 100231 a010d8 100200->100231 100203->100199 100206 a01176 100203->100206 100291 9f8a5d 58 API calls 2 library calls 100204->100291 100277 a05ebb 100206->100277 100207 a01199 100209 a011a1 100207->100209 100210 a011bc 100207->100210 100292 9f8d68 58 API calls __getptd_noexit 100209->100292 100294 a01b11 60 API calls 3 library calls 100210->100294 100211 a0128a 100213 a01303 ReadFile 100211->100213 100218 a012a0 GetConsoleMode 100211->100218 100216 a017e3 GetLastError 100213->100216 100217 a01325 100213->100217 100215 a011a6 100293 9f8d34 58 API calls __getptd_noexit 100215->100293 100220 a017f0 100216->100220 100221 a012e3 100216->100221 100217->100216 100226 a012f5 100217->100226 100222 a01300 100218->100222 100223 a012b4 100218->100223 100300 9f8d68 58 API calls __getptd_noexit 100220->100300 100235 a012e9 100221->100235 100295 9f8d47 58 API calls 3 library calls 100221->100295 100222->100213 100223->100222 100224 a012ba ReadConsoleW 100223->100224 100224->100226 100227 a012dd GetLastError 100224->100227 100233 a0135a 100226->100233 100234 a015c7 100226->100234 100226->100235 100227->100221 100229 a017f5 100301 9f8d34 58 API calls __getptd_noexit 100229->100301 100231->100167 100232 9f2f95 _free 58 API calls 100232->100231 100236 a01447 100233->100236 100238 a013c6 ReadFile 100233->100238 100234->100235 100239 a016cd ReadFile 100234->100239 100235->100231 100235->100232 100236->100235 100241 a014f4 100236->100241 100244 a01504 100236->100244 100248 a014b4 MultiByteToWideChar 100236->100248 100240 a013e7 GetLastError 100238->100240 100245 a013f1 100238->100245 100242 a016f0 GetLastError 100239->100242 100250 a016fe 100239->100250 100240->100245 100297 9f8d68 58 API calls __getptd_noexit 100241->100297 100242->100250 100244->100248 100298 a01b11 60 API calls 3 library calls 100244->100298 100245->100233 100296 a01b11 60 API calls 3 library calls 100245->100296 100248->100227 100248->100235 100250->100234 100299 a01b11 60 API calls 3 library calls 100250->100299 100252 a00e02 100251->100252 100256 a00e17 100251->100256 100338 9f8d68 58 API calls __getptd_noexit 100252->100338 100254 a00e07 100339 9f8ff6 9 API calls _xtow_s@20 100254->100339 100257 a00e4c 100256->100257 100263 a00e12 100256->100263 100340 a06234 58 API calls __malloc_crt 100256->100340 100259 9f4916 __fflush_nolock 58 API calls 100257->100259 100260 a00e60 100259->100260 100305 a00f97 100260->100305 100262 a00e67 100262->100263 100264 9f4916 __fflush_nolock 58 API calls 100262->100264 100263->100167 100265 a00e8a 100264->100265 100265->100263 100266 9f4916 __fflush_nolock 58 API calls 100265->100266 100267 a00e96 100266->100267 100267->100263 100268 9f4916 __fflush_nolock 58 API calls 100267->100268 100269 a00ea3 100268->100269 100270 9f4916 __fflush_nolock 58 API calls 100269->100270 100270->100263 100271->100162 100272->100165 100273->100167 100274->100162 100275->100180 100276->100182 100278 a05ec6 100277->100278 100280 a05ed3 100277->100280 100279 9f8d68 _xtow_s@20 58 API calls 100278->100279 100281 a05ecb 100279->100281 100282 a05edf 100280->100282 100283 9f8d68 _xtow_s@20 58 API calls 100280->100283 100281->100211 100282->100211 100284 a05f00 100283->100284 100285 9f8ff6 _xtow_s@20 9 API calls 100284->100285 100285->100281 100286->100189 100287->100231 100288->100197 100289->100196 100290->100197 100291->100207 100292->100215 100293->100231 100294->100206 100295->100235 100296->100245 100297->100235 100298->100248 100299->100250 100300->100229 100301->100235 100302->100191 100303->100196 100304->100231 100306 a00fa3 __ioinit 100305->100306 100307 a00fb0 100306->100307 100308 a00fc7 100306->100308 100310 9f8d34 __free_osfhnd 58 API calls 100307->100310 100309 a0108b 100308->100309 100311 a00fdb 100308->100311 100312 9f8d34 __free_osfhnd 58 API calls 100309->100312 100313 a00fb5 100310->100313 100314 a01006 100311->100314 100315 a00ff9 100311->100315 100320 a00ffe 100312->100320 100316 9f8d68 _xtow_s@20 58 API calls 100313->100316 100318 a01013 100314->100318 100319 a01028 100314->100319 100317 9f8d34 __free_osfhnd 58 API calls 100315->100317 100327 a00fbc __ioinit 100316->100327 100317->100320 100321 9f8d34 __free_osfhnd 58 API calls 100318->100321 100322 9fd446 ___lock_fhandle 59 API calls 100319->100322 100323 9f8d68 _xtow_s@20 58 API calls 100320->100323 100324 a01018 100321->100324 100325 a0102e 100322->100325 100326 a01020 100323->100326 100328 9f8d68 _xtow_s@20 58 API calls 100324->100328 100329 a01041 100325->100329 100330 a01054 100325->100330 100331 9f8ff6 _xtow_s@20 9 API calls 100326->100331 100327->100262 100328->100326 100333 a010ab __read_nolock 70 API calls 100329->100333 100332 9f8d68 _xtow_s@20 58 API calls 100330->100332 100331->100327 100335 a01059 100332->100335 100334 a0104d 100333->100334 100337 a01083 __read LeaveCriticalSection 100334->100337 100336 9f8d34 __free_osfhnd 58 API calls 100335->100336 100336->100334 100337->100327 100338->100254 100339->100263 100340->100257 100344 9f543a GetSystemTimeAsFileTime 100341->100344 100343 a391f8 100343->99936 100345 9f5468 __aulldiv 100344->100345 100345->100343 100347 9f5e9c __ioinit 100346->100347 100348 9f5eae 100347->100348 100349 9f5ec3 100347->100349 100360 9f8d68 58 API calls __getptd_noexit 100348->100360 100351 9f6e4e __lock_file 59 API calls 100349->100351 100353 9f5ec9 100351->100353 100352 9f5eb3 100361 9f8ff6 9 API calls _xtow_s@20 100352->100361 100362 9f5b00 67 API calls 6 library calls 100353->100362 100356 9f5ed4 100363 9f5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 100356->100363 100358 9f5ee6 100359 9f5ebe __ioinit 100358->100359 100359->99940 100360->100352 100361->100359 100362->100356 100363->100358 100364->99820 100365->99822 100366->99872 100368 9f4a9f __ioinit 100367->100368 100369 9f4abd 100368->100369 100370 9f4ad5 100368->100370 100371 9f4acd __ioinit 100368->100371 100447 9f8d68 58 API calls __getptd_noexit 100369->100447 100372 9f6e4e __lock_file 59 API calls 100370->100372 100371->99881 100375 9f4adb 100372->100375 100374 9f4ac2 100448 9f8ff6 9 API calls _xtow_s@20 100374->100448 100435 9f493a 100375->100435 100381 9f55e2 __ioinit 100380->100381 100382 9f560e 100381->100382 100383 9f55f6 100381->100383 100385 9f6e4e __lock_file 59 API calls 100382->100385 100387 9f5606 __ioinit 100382->100387 100609 9f8d68 58 API calls __getptd_noexit 100383->100609 100388 9f5620 100385->100388 100386 9f55fb 100387->99875 100401 a399d2 __tzset_nolock _wcscmp 100396->100401 100397 9d506b 74 API calls 100397->100401 100398 a3949a 100398->99852 100402 9f432e 58 API calls __wsplitpath_helper 100398->100402 100399 a39393 GetSystemTimeAsFileTime 100399->100401 100400 9d5045 85 API calls 100400->100401 100401->100397 100401->100398 100401->100399 100401->100400 100402->99855 100403->99863 100447->100374 100448->100371 100609->100386 100730 a26641 100729->100730 100731 a2665e 100729->100731 100730->100731 100733 a26621 59 API calls Mailbox 100730->100733 100731->99189 100733->100730 100734 9d568a 100735 9d5c18 59 API calls 100734->100735 100736 9d569c 100735->100736 100737 9d5632 61 API calls 100736->100737 100738 9d56aa 100737->100738 100740 9d56ba Mailbox 100738->100740 100741 9d81c1 61 API calls Mailbox 100738->100741 100741->100740 100742 a10226 100743 9dade2 Mailbox 100742->100743 100744 9db6c1 100743->100744 100746 a10c86 100743->100746 100748 a10c8f 100743->100748 100750 a100e0 VariantClear 100743->100750 100752 a4e237 130 API calls 100743->100752 100753 a3d2e6 101 API calls 100743->100753 100754 a3d2e5 101 API calls 100743->100754 100755 a5251d 62 API calls 100743->100755 100756 a4474d 341 API calls 100743->100756 100757 9e2123 95 API calls 100743->100757 100758 9d9df0 59 API calls Mailbox 100743->100758 100759 a27405 59 API calls 100743->100759 100760 a3a0b5 89 API calls 4 library calls 100744->100760 100747 a266f4 Mailbox 59 API calls 100746->100747 100747->100748 100750->100743 100752->100743 100753->100743 100754->100743 100755->100743 100756->100743 100757->100743 100758->100743 100759->100743 100760->100746 100761 9d1055 100766 9d2649 100761->100766 100764 9f2f80 __cinit 67 API calls 100765 9d1064 100764->100765 100767 9d77c7 59 API calls 100766->100767 100768 9d26b7 100767->100768 100773 9d3582 100768->100773 100770 9d2754 100772 9d105a 100770->100772 100776 9d3416 59 API calls 2 library calls 100770->100776 100772->100764 100777 9d35b0 100773->100777 100776->100770 100778 9d35bd 100777->100778 100779 9d35a1 100777->100779 100778->100779 100780 9d35c4 RegOpenKeyExW 100778->100780 100779->100770 100780->100779 100781 9d35de RegQueryValueExW 100780->100781 100782 9d35ff 100781->100782 100783 9d3614 RegCloseKey 100781->100783 100782->100783 100783->100779 100784 9923b0 100785 990000 GetPEB 100784->100785 100786 99245c 100785->100786 100798 9922a0 100786->100798 100799 9922a9 Sleep 100798->100799 100800 9922b7 100799->100800 100801 9d1016 100806 9d4ad2 100801->100806 100804 9f2f80 __cinit 67 API calls 100805 9d1025 100804->100805 100807 9f0ff6 Mailbox 59 API calls 100806->100807 100808 9d4ada 100807->100808 100810 9d101b 100808->100810 100813 9d4a94 100808->100813 100810->100804 100814 9d4a9d 100813->100814 100815 9d4aaf 100813->100815 100816 9f2f80 __cinit 67 API calls 100814->100816 100817 9d4afe 100815->100817 100816->100815 100818 9d77c7 59 API calls 100817->100818 100819 9d4b16 GetVersionExW 100818->100819 100820 9d7d2c 59 API calls 100819->100820 100823 9d4b59 100820->100823 100821 9d7e8c 59 API calls 100822 9d4b7a 100821->100822 100824 9d7886 59 API calls 100822->100824 100823->100821 100831 9d4b86 100823->100831 100824->100831 100825 9d4bf1 GetCurrentProcess IsWow64Process 100826 9d4c0a 100825->100826 100828 9d4c89 GetSystemInfo 100826->100828 100829 9d4c20 100826->100829 100827 a0dc8d 100830 9d4c56 100828->100830 100841 9d4c95 100829->100841 100830->100810 100831->100825 100831->100827 100834 9d4c7d GetSystemInfo 100836 9d4c47 100834->100836 100835 9d4c32 100837 9d4c95 2 API calls 100835->100837 100836->100830 100839 9d4c4d FreeLibrary 100836->100839 100838 9d4c3a GetNativeSystemInfo 100837->100838 100838->100836 100839->100830 100842 9d4c2e 100841->100842 100843 9d4c9e LoadLibraryA 100841->100843 100842->100834 100842->100835 100843->100842 100844 9d4caf GetProcAddress 100843->100844 100844->100842 100845 9d1066 100850 9df8cf 100845->100850 100847 9d106c 100848 9f2f80 __cinit 67 API calls 100847->100848 100849 9d1076 100848->100849 100851 9df8f0 100850->100851 100883 9f0143 100851->100883 100855 9df937 100856 9d77c7 59 API calls 100855->100856 100857 9df941 100856->100857 100858 9d77c7 59 API calls 100857->100858 100859 9df94b 100858->100859 100860 9d77c7 59 API calls 100859->100860 100861 9df955 100860->100861 100862 9d77c7 59 API calls 100861->100862 100863 9df993 100862->100863 100864 9d77c7 59 API calls 100863->100864 100865 9dfa5e 100864->100865 100893 9e60e7 100865->100893 100869 9dfa90 100870 9d77c7 59 API calls 100869->100870 100871 9dfa9a 100870->100871 100921 9effde 100871->100921 100873 9dfae1 100874 9dfaf1 GetStdHandle 100873->100874 100875 9dfb3d 100874->100875 100876 a149d5 100874->100876 100877 9dfb45 OleInitialize 100875->100877 100876->100875 100878 a149de 100876->100878 100877->100847 100928 a36dda 64 API calls Mailbox 100878->100928 100880 a149e5 100929 a374a9 CreateThread 100880->100929 100882 a149f1 CloseHandle 100882->100877 100930 9f021c 100883->100930 100886 9f021c 59 API calls 100887 9f0185 100886->100887 100888 9d77c7 59 API calls 100887->100888 100889 9f0191 100888->100889 100890 9d7d2c 59 API calls 100889->100890 100891 9df8f6 100890->100891 100892 9f03a2 6 API calls 100891->100892 100892->100855 100894 9d77c7 59 API calls 100893->100894 100895 9e60f7 100894->100895 100896 9d77c7 59 API calls 100895->100896 100897 9e60ff 100896->100897 100937 9e5bfd 100897->100937 100900 9e5bfd 59 API calls 100901 9e610f 100900->100901 100902 9d77c7 59 API calls 100901->100902 100903 9e611a 100902->100903 100904 9f0ff6 Mailbox 59 API calls 100903->100904 100905 9dfa68 100904->100905 100906 9e6259 100905->100906 100907 9e6267 100906->100907 100908 9d77c7 59 API calls 100907->100908 100909 9e6272 100908->100909 100910 9d77c7 59 API calls 100909->100910 100911 9e627d 100910->100911 100912 9d77c7 59 API calls 100911->100912 100913 9e6288 100912->100913 100914 9d77c7 59 API calls 100913->100914 100915 9e6293 100914->100915 100916 9e5bfd 59 API calls 100915->100916 100917 9e629e 100916->100917 100918 9f0ff6 Mailbox 59 API calls 100917->100918 100919 9e62a5 RegisterWindowMessageW 100918->100919 100919->100869 100922 9effee 100921->100922 100923 a25cc3 100921->100923 100924 9f0ff6 Mailbox 59 API calls 100922->100924 100940 a39d71 60 API calls 100923->100940 100926 9efff6 100924->100926 100926->100873 100927 a25cce 100928->100880 100929->100882 100941 a3748f 65 API calls 100929->100941 100931 9d77c7 59 API calls 100930->100931 100932 9f0227 100931->100932 100933 9d77c7 59 API calls 100932->100933 100934 9f022f 100933->100934 100935 9d77c7 59 API calls 100934->100935 100936 9f017b 100935->100936 100936->100886 100938 9d77c7 59 API calls 100937->100938 100939 9e5c05 100938->100939 100939->100900 100940->100927 100942 9f7e93 100943 9f7e9f __ioinit 100942->100943 100979 9fa048 GetStartupInfoW 100943->100979 100945 9f7ea4 100981 9f8dbc GetProcessHeap 100945->100981 100947 9f7efc 100948 9f7f07 100947->100948 101064 9f7fe3 58 API calls 3 library calls 100947->101064 100982 9f9d26 100948->100982 100951 9f7f0d 100952 9f7f18 __RTC_Initialize 100951->100952 101065 9f7fe3 58 API calls 3 library calls 100951->101065 101003 9fd812 100952->101003 100955 9f7f27 100956 9f7f33 GetCommandLineW 100955->100956 101066 9f7fe3 58 API calls 3 library calls 100955->101066 101022 a05173 GetEnvironmentStringsW 100956->101022 100959 9f7f32 100959->100956 100962 9f7f4d 100963 9f7f58 100962->100963 101067 9f32f5 58 API calls 3 library calls 100962->101067 101032 a04fa8 100963->101032 100966 9f7f5e 100967 9f7f69 100966->100967 101068 9f32f5 58 API calls 3 library calls 100966->101068 101046 9f332f 100967->101046 100970 9f7f71 100972 9f7f7c __wwincmdln 100970->100972 101069 9f32f5 58 API calls 3 library calls 100970->101069 101052 9d492e 100972->101052 100974 9f7f90 100975 9f7f9f 100974->100975 101070 9f3598 58 API calls _doexit 100974->101070 101071 9f3320 58 API calls _doexit 100975->101071 100978 9f7fa4 __ioinit 100980 9fa05e 100979->100980 100980->100945 100981->100947 101072 9f33c7 36 API calls 2 library calls 100982->101072 100984 9f9d2b 101073 9f9f7c InitializeCriticalSectionAndSpinCount __ioinit 100984->101073 100986 9f9d30 100987 9f9d34 100986->100987 101075 9f9fca TlsAlloc 100986->101075 101074 9f9d9c 61 API calls 2 library calls 100987->101074 100990 9f9d39 100990->100951 100991 9f9d46 100991->100987 100992 9f9d51 100991->100992 101076 9f8a15 100992->101076 100995 9f9d93 101084 9f9d9c 61 API calls 2 library calls 100995->101084 100998 9f9d72 100998->100995 101000 9f9d78 100998->101000 100999 9f9d98 100999->100951 101083 9f9c73 58 API calls 4 library calls 101000->101083 101002 9f9d80 GetCurrentThreadId 101002->100951 101004 9fd81e __ioinit 101003->101004 101005 9f9e4b __lock 58 API calls 101004->101005 101006 9fd825 101005->101006 101007 9f8a15 __calloc_crt 58 API calls 101006->101007 101009 9fd836 101007->101009 101008 9fd8a1 GetStartupInfoW 101010 9fd8b6 101008->101010 101011 9fd9e5 101008->101011 101009->101008 101012 9fd841 __ioinit @_EH4_CallFilterFunc@8 101009->101012 101010->101011 101015 9f8a15 __calloc_crt 58 API calls 101010->101015 101018 9fd904 101010->101018 101013 9fdaad 101011->101013 101016 9fda32 GetStdHandle 101011->101016 101017 9fda45 GetFileType 101011->101017 101097 9fa06b InitializeCriticalSectionAndSpinCount 101011->101097 101012->100955 101098 9fdabd LeaveCriticalSection _doexit 101013->101098 101015->101010 101016->101011 101017->101011 101018->101011 101019 9fd938 GetFileType 101018->101019 101096 9fa06b InitializeCriticalSectionAndSpinCount 101018->101096 101019->101018 101023 a05184 101022->101023 101024 9f7f43 101022->101024 101099 9f8a5d 58 API calls 2 library calls 101023->101099 101028 a04d6b GetModuleFileNameW 101024->101028 101026 a051c0 FreeEnvironmentStringsW 101026->101024 101027 a051aa _memmove 101027->101026 101029 a04d9f _wparse_cmdline 101028->101029 101031 a04ddf _wparse_cmdline 101029->101031 101100 9f8a5d 58 API calls 2 library calls 101029->101100 101031->100962 101033 a04fc1 __wsetenvp 101032->101033 101037 a04fb9 101032->101037 101034 9f8a15 __calloc_crt 58 API calls 101033->101034 101042 a04fea __wsetenvp 101034->101042 101035 a05041 101036 9f2f95 _free 58 API calls 101035->101036 101036->101037 101037->100966 101038 9f8a15 __calloc_crt 58 API calls 101038->101042 101039 a05066 101040 9f2f95 _free 58 API calls 101039->101040 101040->101037 101042->101035 101042->101037 101042->101038 101042->101039 101043 a0507d 101042->101043 101101 a04857 58 API calls _xtow_s@20 101042->101101 101102 9f9006 IsProcessorFeaturePresent 101043->101102 101045 a05089 101045->100966 101047 9f333b __IsNonwritableInCurrentImage 101046->101047 101117 9fa711 101047->101117 101049 9f3359 __initterm_e 101050 9f2f80 __cinit 67 API calls 101049->101050 101051 9f3378 _doexit __IsNonwritableInCurrentImage 101049->101051 101050->101051 101051->100970 101053 9d4948 101052->101053 101063 9d49e7 101052->101063 101054 9d4982 IsThemeActive 101053->101054 101120 9f35ac 101054->101120 101058 9d49ae 101132 9d4a5b SystemParametersInfoW SystemParametersInfoW 101058->101132 101060 9d49ba 101133 9d3b4c 101060->101133 101062 9d49c2 SystemParametersInfoW 101062->101063 101063->100974 101064->100948 101065->100952 101066->100959 101070->100975 101071->100978 101072->100984 101073->100986 101074->100990 101075->100991 101077 9f8a1c 101076->101077 101079 9f8a57 101077->101079 101081 9f8a3a 101077->101081 101085 a05446 101077->101085 101079->100995 101082 9fa026 TlsSetValue 101079->101082 101081->101077 101081->101079 101093 9fa372 Sleep 101081->101093 101082->100998 101083->101002 101084->100999 101086 a05451 101085->101086 101091 a0546c 101085->101091 101087 a0545d 101086->101087 101086->101091 101094 9f8d68 58 API calls __getptd_noexit 101087->101094 101089 a0547c RtlAllocateHeap 101090 a05462 101089->101090 101089->101091 101090->101077 101091->101089 101091->101090 101095 9f35e1 DecodePointer 101091->101095 101093->101081 101094->101090 101095->101091 101096->101018 101097->101011 101098->101012 101099->101027 101100->101031 101101->101042 101103 9f9011 101102->101103 101108 9f8e99 101103->101108 101107 9f902c 101107->101045 101109 9f8eb3 _memset ___raise_securityfailure 101108->101109 101110 9f8ed3 IsDebuggerPresent 101109->101110 101116 9fa395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101110->101116 101112 9fc836 _$I10_OUTPUT 6 API calls 101114 9f8fba 101112->101114 101113 9f8f97 ___raise_securityfailure 101113->101112 101115 9fa380 GetCurrentProcess TerminateProcess 101114->101115 101115->101107 101116->101113 101118 9fa714 EncodePointer 101117->101118 101118->101118 101119 9fa72e 101118->101119 101119->101049 101121 9f9e4b __lock 58 API calls 101120->101121 101122 9f35b7 DecodePointer EncodePointer 101121->101122 101185 9f9fb5 LeaveCriticalSection 101122->101185 101124 9d49a7 101125 9f3614 101124->101125 101126 9f3638 101125->101126 101127 9f361e 101125->101127 101126->101058 101127->101126 101186 9f8d68 58 API calls __getptd_noexit 101127->101186 101129 9f3628 101187 9f8ff6 9 API calls _xtow_s@20 101129->101187 101131 9f3633 101131->101058 101132->101060 101134 9d3b59 __write_nolock 101133->101134 101135 9d77c7 59 API calls 101134->101135 101136 9d3b63 GetCurrentDirectoryW 101135->101136 101188 9d3778 101136->101188 101138 9d3b8c IsDebuggerPresent 101139 9d3b9a 101138->101139 101140 a0d4ad MessageBoxA 101138->101140 101142 a0d4c7 101139->101142 101143 9d3bb7 101139->101143 101172 9d3c73 101139->101172 101140->101142 101141 9d3c7a SetCurrentDirectoryW 101146 9d3c87 Mailbox 101141->101146 101398 9d7373 59 API calls Mailbox 101142->101398 101269 9d73e5 101143->101269 101146->101062 101147 a0d4d7 101152 a0d4ed SetCurrentDirectoryW 101147->101152 101152->101146 101172->101141 101185->101124 101186->101129 101187->101131 101189 9d77c7 59 API calls 101188->101189 101190 9d378e 101189->101190 101400 9d3d43 101190->101400 101192 9d37ac 101193 9d4864 61 API calls 101192->101193 101194 9d37c0 101193->101194 101195 9d7f41 59 API calls 101194->101195 101196 9d37cd 101195->101196 101197 9d4f3d 136 API calls 101196->101197 101198 9d37e6 101197->101198 101199 9d37ee Mailbox 101198->101199 101200 a0d3ae 101198->101200 101204 9d81a7 59 API calls 101199->101204 101442 a397e5 101200->101442 101203 a0d3cd 101206 9f2f95 _free 58 API calls 101203->101206 101207 9d3801 101204->101207 101205 9d4faa 84 API calls 101205->101203 101209 a0d3da 101206->101209 101414 9d93ea 101207->101414 101210 9d4faa 84 API calls 101209->101210 101212 a0d3e3 101210->101212 101216 9d3ee2 59 API calls 101212->101216 101213 9d7f41 59 API calls 101214 9d381a 101213->101214 101215 9d8620 69 API calls 101214->101215 101217 9d382c Mailbox 101215->101217 101218 a0d3fe 101216->101218 101219 9d7f41 59 API calls 101217->101219 101220 9d3ee2 59 API calls 101218->101220 101221 9d3852 101219->101221 101222 a0d41a 101220->101222 101223 9d8620 69 API calls 101221->101223 101224 9d4864 61 API calls 101222->101224 101226 9d3861 Mailbox 101223->101226 101225 a0d43f 101224->101225 101227 9d3ee2 59 API calls 101225->101227 101228 9d77c7 59 API calls 101226->101228 101229 a0d44b 101227->101229 101231 9d387f 101228->101231 101230 9d81a7 59 API calls 101229->101230 101232 a0d459 101230->101232 101417 9d3ee2 101231->101417 101234 9d3ee2 59 API calls 101232->101234 101236 a0d468 101234->101236 101242 9d81a7 59 API calls 101236->101242 101238 9d3899 101238->101212 101239 9d38a3 101238->101239 101240 9f313d _W_store_winword 60 API calls 101239->101240 101241 9d38ae 101240->101241 101241->101218 101243 9d38b8 101241->101243 101244 a0d48a 101242->101244 101245 9f313d _W_store_winword 60 API calls 101243->101245 101246 9d3ee2 59 API calls 101244->101246 101247 9d38c3 101245->101247 101248 a0d497 101246->101248 101247->101222 101249 9d38cd 101247->101249 101248->101248 101250 9f313d _W_store_winword 60 API calls 101249->101250 101251 9d38d8 101250->101251 101251->101236 101252 9d3919 101251->101252 101254 9d3ee2 59 API calls 101251->101254 101252->101236 101253 9d3926 101252->101253 101256 9d942e 59 API calls 101253->101256 101255 9d38fc 101254->101255 101257 9d81a7 59 API calls 101255->101257 101258 9d3936 101256->101258 101259 9d390a 101257->101259 101260 9d91b0 59 API calls 101258->101260 101261 9d3ee2 59 API calls 101259->101261 101262 9d3944 101260->101262 101261->101252 101433 9d9040 101262->101433 101264 9d3961 101265 9d93ea 59 API calls 101264->101265 101266 9d9040 60 API calls 101264->101266 101267 9d3ee2 59 API calls 101264->101267 101268 9d39a7 Mailbox 101264->101268 101265->101264 101266->101264 101267->101264 101268->101138 101270 9d73f2 __write_nolock 101269->101270 101271 9d740b 101270->101271 101272 a0ee4b _memset 101270->101272 101273 9d48ae 60 API calls 101271->101273 101275 a0ee67 GetOpenFileNameW 101272->101275 101274 9d7414 101273->101274 101482 9f09d5 101274->101482 101277 a0eeb6 101275->101277 101279 9d7d2c 59 API calls 101277->101279 101281 a0eecb 101279->101281 101281->101281 101398->101147 101401 9d3d50 __write_nolock 101400->101401 101402 9d7d2c 59 API calls 101401->101402 101412 9d3eb6 Mailbox 101401->101412 101404 9d3d82 101402->101404 101403 9d7b52 59 API calls 101403->101404 101404->101403 101405 9d3db8 Mailbox 101404->101405 101406 9d3e89 101405->101406 101408 9d7f41 59 API calls 101405->101408 101411 9d3f84 59 API calls 101405->101411 101405->101412 101413 9d7b52 59 API calls 101405->101413 101407 9d7f41 59 API calls 101406->101407 101406->101412 101409 9d3eaa 101407->101409 101408->101405 101410 9d3f84 59 API calls 101409->101410 101410->101412 101411->101405 101412->101192 101413->101405 101415 9f0ff6 Mailbox 59 API calls 101414->101415 101416 9d380d 101415->101416 101416->101213 101418 9d3eec 101417->101418 101419 9d3f05 101417->101419 101421 9d81a7 59 API calls 101418->101421 101420 9d7d2c 59 API calls 101419->101420 101422 9d388b 101420->101422 101421->101422 101423 9f313d 101422->101423 101424 9f31be 101423->101424 101425 9f3149 101423->101425 101479 9f31d0 60 API calls 3 library calls 101424->101479 101432 9f316e 101425->101432 101477 9f8d68 58 API calls __getptd_noexit 101425->101477 101428 9f31cb 101428->101238 101429 9f3155 101478 9f8ff6 9 API calls _xtow_s@20 101429->101478 101431 9f3160 101431->101238 101432->101238 101434 a0f5a5 101433->101434 101440 9d9057 101433->101440 101434->101440 101481 9d8d3b 59 API calls Mailbox 101434->101481 101436 9d9158 101438 9f0ff6 Mailbox 59 API calls 101436->101438 101437 9d91a0 101480 9d9e9c 60 API calls Mailbox 101437->101480 101441 9d915f 101438->101441 101440->101436 101440->101437 101440->101441 101441->101264 101443 9d5045 85 API calls 101442->101443 101444 a39854 101443->101444 101445 a399be 96 API calls 101444->101445 101446 a39866 101445->101446 101447 9d506b 74 API calls 101446->101447 101475 a0d3c1 101446->101475 101448 a39881 101447->101448 101449 9d506b 74 API calls 101448->101449 101450 a39891 101449->101450 101451 9d506b 74 API calls 101450->101451 101452 a398ac 101451->101452 101453 9d506b 74 API calls 101452->101453 101454 a398c7 101453->101454 101455 9d5045 85 API calls 101454->101455 101456 a398de 101455->101456 101457 9f594c std::exception::_Copy_str 58 API calls 101456->101457 101458 a398e5 101457->101458 101459 9f594c std::exception::_Copy_str 58 API calls 101458->101459 101460 a398ef 101459->101460 101461 9d506b 74 API calls 101460->101461 101462 a39903 101461->101462 101463 a39393 GetSystemTimeAsFileTime 101462->101463 101464 a39916 101463->101464 101465 a39940 101464->101465 101466 a3992b 101464->101466 101467 a39946 101465->101467 101468 a399a5 101465->101468 101469 9f2f95 _free 58 API calls 101466->101469 101471 a38d90 116 API calls 101467->101471 101472 9f2f95 _free 58 API calls 101468->101472 101470 a39931 101469->101470 101473 9f2f95 _free 58 API calls 101470->101473 101474 a3999d 101471->101474 101472->101475 101473->101475 101476 9f2f95 _free 58 API calls 101474->101476 101475->101203 101475->101205 101476->101475 101477->101429 101478->101431 101479->101428 101480->101441 101481->101440 101483 a01b90 __write_nolock 101482->101483 101484 9f09e2 GetLongPathNameW 101483->101484 101485 9d7d2c 59 API calls 101484->101485 101786 9d3633 101787 9d366a 101786->101787 101788 9d3688 101787->101788 101789 9d36e7 101787->101789 101826 9d36e5 101787->101826 101790 9d375d PostQuitMessage 101788->101790 101791 9d3695 101788->101791 101793 9d36ed 101789->101793 101794 a0d31c 101789->101794 101798 9d36d8 101790->101798 101795 9d36a0 101791->101795 101796 a0d38f 101791->101796 101792 9d36ca DefWindowProcW 101792->101798 101799 9d3715 SetTimer RegisterWindowMessageW 101793->101799 101800 9d36f2 101793->101800 101836 9e11d0 10 API calls Mailbox 101794->101836 101801 9d36a8 101795->101801 101802 9d3767 101795->101802 101840 a32a16 71 API calls _memset 101796->101840 101799->101798 101803 9d373e CreatePopupMenu 101799->101803 101806 9d36f9 KillTimer 101800->101806 101807 a0d2bf 101800->101807 101808 a0d374 101801->101808 101809 9d36b3 101801->101809 101834 9d4531 64 API calls _memset 101802->101834 101803->101798 101805 a0d343 101837 9e11f3 341 API calls Mailbox 101805->101837 101831 9d44cb Shell_NotifyIconW _memset 101806->101831 101813 a0d2c4 101807->101813 101814 a0d2f8 MoveWindow 101807->101814 101808->101792 101839 a2817e 59 API calls Mailbox 101808->101839 101816 9d36be 101809->101816 101817 9d374b 101809->101817 101810 a0d3a1 101810->101792 101810->101798 101819 a0d2e7 SetFocus 101813->101819 101820 a0d2c8 101813->101820 101814->101798 101816->101792 101838 9d44cb Shell_NotifyIconW _memset 101816->101838 101833 9d45df 81 API calls _memset 101817->101833 101818 9d375b 101818->101798 101819->101798 101820->101816 101825 a0d2d1 101820->101825 101821 9d370c 101832 9d3114 DeleteObject DestroyWindow Mailbox 101821->101832 101835 9e11d0 10 API calls Mailbox 101825->101835 101826->101792 101829 a0d368 101830 9d43db 68 API calls 101829->101830 101830->101826 101831->101821 101832->101798 101833->101818 101834->101818 101835->101798 101836->101805 101837->101816 101838->101829 101839->101826 101840->101810

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009D3B7A
                                                • IsDebuggerPresent.KERNEL32 ref: 009D3B8C
                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,00A962F8,00A962E0,?,?), ref: 009D3BFD
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                  • Part of subcall function 009E0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,009D3C26,00A962F8,?,?,?), ref: 009E0ACE
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 009D3C81
                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00A893F0,00000010), ref: 00A0D4BC
                                                • SetCurrentDirectoryW.KERNEL32(?,00A962F8,?,?,?), ref: 00A0D4F4
                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00A85D40,00A962F8,?,?,?), ref: 00A0D57A
                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00A0D581
                                                  • Part of subcall function 009D3A58: GetSysColorBrush.USER32(0000000F), ref: 009D3A62
                                                  • Part of subcall function 009D3A58: LoadCursorW.USER32(00000000,00007F00), ref: 009D3A71
                                                  • Part of subcall function 009D3A58: LoadIconW.USER32(00000063), ref: 009D3A88
                                                  • Part of subcall function 009D3A58: LoadIconW.USER32(000000A4), ref: 009D3A9A
                                                  • Part of subcall function 009D3A58: LoadIconW.USER32(000000A2), ref: 009D3AAC
                                                  • Part of subcall function 009D3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009D3AD2
                                                  • Part of subcall function 009D3A58: RegisterClassExW.USER32(?), ref: 009D3B28
                                                  • Part of subcall function 009D39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009D3A15
                                                  • Part of subcall function 009D39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009D3A36
                                                  • Part of subcall function 009D39E7: ShowWindow.USER32(00000000,?,?), ref: 009D3A4A
                                                  • Part of subcall function 009D39E7: ShowWindow.USER32(00000000,?,?), ref: 009D3A53
                                                  • Part of subcall function 009D43DB: _memset.LIBCMT ref: 009D4401
                                                  • Part of subcall function 009D43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009D44A6
                                                Strings
                                                • This is a third-party compiled AutoIt script., xrefs: 00A0D4B4
                                                • runas, xrefs: 00A0D575
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                • String ID: This is a third-party compiled AutoIt script.$runas
                                                • API String ID: 529118366-3287110873
                                                • Opcode ID: 822276df1e6276f635ffae4ccc6ec3fed9d7df8221120a79c3a03e0d9ad803df
                                                • Instruction ID: f56deed95fb25c34bdb701df2ecff74c7bd19f4ec11ddf8d06e09dd3ff71678e
                                                • Opcode Fuzzy Hash: 822276df1e6276f635ffae4ccc6ec3fed9d7df8221120a79c3a03e0d9ad803df
                                                • Instruction Fuzzy Hash: 2B51F571E54248BECF11EBF4EC05AFEBB78BF84341B04C167F851A62A1DA745A46CB21

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 996 9d4afe-9d4b5e call 9d77c7 GetVersionExW call 9d7d2c 1001 9d4c69-9d4c6b 996->1001 1002 9d4b64 996->1002 1004 a0db90-a0db9c 1001->1004 1003 9d4b67-9d4b6c 1002->1003 1006 9d4c70-9d4c71 1003->1006 1007 9d4b72 1003->1007 1005 a0db9d-a0dba1 1004->1005 1009 a0dba3 1005->1009 1010 a0dba4-a0dbb0 1005->1010 1008 9d4b73-9d4baa call 9d7e8c call 9d7886 1006->1008 1007->1008 1018 a0dc8d-a0dc90 1008->1018 1019 9d4bb0-9d4bb1 1008->1019 1009->1010 1010->1005 1012 a0dbb2-a0dbb7 1010->1012 1012->1003 1014 a0dbbd-a0dbc4 1012->1014 1014->1004 1016 a0dbc6 1014->1016 1020 a0dbcb-a0dbce 1016->1020 1021 a0dc92 1018->1021 1022 a0dca9-a0dcad 1018->1022 1019->1020 1023 9d4bb7-9d4bc2 1019->1023 1024 a0dbd4-a0dbf2 1020->1024 1025 9d4bf1-9d4c08 GetCurrentProcess IsWow64Process 1020->1025 1030 a0dc95 1021->1030 1026 a0dc98-a0dca1 1022->1026 1027 a0dcaf-a0dcb8 1022->1027 1031 a0dc13-a0dc19 1023->1031 1032 9d4bc8-9d4bca 1023->1032 1024->1025 1033 a0dbf8-a0dbfe 1024->1033 1028 9d4c0d-9d4c1e 1025->1028 1029 9d4c0a 1025->1029 1026->1022 1027->1030 1036 a0dcba-a0dcbd 1027->1036 1037 9d4c89-9d4c93 GetSystemInfo 1028->1037 1038 9d4c20-9d4c30 call 9d4c95 1028->1038 1029->1028 1030->1026 1034 a0dc23-a0dc29 1031->1034 1035 a0dc1b-a0dc1e 1031->1035 1039 9d4bd0-9d4bd3 1032->1039 1040 a0dc2e-a0dc3a 1032->1040 1041 a0dc00-a0dc03 1033->1041 1042 a0dc08-a0dc0e 1033->1042 1034->1025 1035->1025 1036->1026 1043 9d4c56-9d4c66 1037->1043 1053 9d4c7d-9d4c87 GetSystemInfo 1038->1053 1054 9d4c32-9d4c3f call 9d4c95 1038->1054 1047 9d4bd9-9d4be8 1039->1047 1048 a0dc5a-a0dc5d 1039->1048 1044 a0dc44-a0dc4a 1040->1044 1045 a0dc3c-a0dc3f 1040->1045 1041->1025 1042->1025 1044->1025 1045->1025 1049 9d4bee 1047->1049 1050 a0dc4f-a0dc55 1047->1050 1048->1025 1052 a0dc63-a0dc78 1048->1052 1049->1025 1050->1025 1055 a0dc82-a0dc88 1052->1055 1056 a0dc7a-a0dc7d 1052->1056 1057 9d4c47-9d4c4b 1053->1057 1061 9d4c76-9d4c7b 1054->1061 1062 9d4c41-9d4c45 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1057->1043 1060 9d4c4d-9d4c50 FreeLibrary 1057->1060 1060->1043 1061->1062 1062->1057
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 009D4B2B
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                • GetCurrentProcess.KERNEL32(?,00A5FAEC,00000000,00000000,?), ref: 009D4BF8
                                                • IsWow64Process.KERNEL32(00000000), ref: 009D4BFF
                                                • GetNativeSystemInfo.KERNELBASE(00000000), ref: 009D4C45
                                                • FreeLibrary.KERNEL32(00000000), ref: 009D4C50
                                                • GetSystemInfo.KERNEL32(00000000), ref: 009D4C81
                                                • GetSystemInfo.KERNEL32(00000000), ref: 009D4C8D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                • String ID:
                                                • API String ID: 1986165174-0
                                                • Opcode ID: 6b31e3d8f042d30c97b060058972a494caa5cdb64337a9812687f71d2c8a808c
                                                • Instruction ID: 789c2f57ba5c8338e0ac26c5b05f1ee6cdf6d1223e27b74298f0503800192768
                                                • Opcode Fuzzy Hash: 6b31e3d8f042d30c97b060058972a494caa5cdb64337a9812687f71d2c8a808c
                                                • Instruction Fuzzy Hash: B691A03198ABC4DFC721DBB895511AABFE4AF36300B488E5FD0CA97B41D235A908C759

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1063 9d4fe9-9d5001 CreateStreamOnHGlobal 1064 9d5021-9d5026 1063->1064 1065 9d5003-9d501a FindResourceExW 1063->1065 1066 a0dd5c-a0dd6b LoadResource 1065->1066 1067 9d5020 1065->1067 1066->1067 1068 a0dd71-a0dd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 a0dd85-a0dd90 LockResource 1068->1069 1069->1067 1070 a0dd96-a0ddb4 1069->1070 1070->1067
                                                APIs
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,009D4EEE,?,?,00000000,00000000), ref: 009D4FF9
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009D4EEE,?,?,00000000,00000000), ref: 009D5010
                                                • LoadResource.KERNEL32(?,00000000,?,?,009D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009D4F8F), ref: 00A0DD60
                                                • SizeofResource.KERNEL32(?,00000000,?,?,009D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009D4F8F), ref: 00A0DD75
                                                • LockResource.KERNEL32(009D4EEE,?,?,009D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009D4F8F,00000000), ref: 00A0DD88
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: e964c1a212c450fc54bc16f3d51769bc05bfdad56bfd4475601a7e4b7b1ae032
                                                • Instruction ID: c707e48c7a9dd73d8f060e62b34f8ce54069fefdb40d33c1f5232d0e35995e67
                                                • Opcode Fuzzy Hash: e964c1a212c450fc54bc16f3d51769bc05bfdad56bfd4475601a7e4b7b1ae032
                                                • Instruction Fuzzy Hash: A7115EB5240700BFD7218B65EC58F677BBDFBC9B52F208569F409862A0DB71E801C661
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,00A0E7C1), ref: 00A346A6
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00A346B7
                                                • FindClose.KERNEL32(00000000), ref: 00A346C7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirst
                                                • String ID:
                                                • API String ID: 48322524-0
                                                • Opcode ID: 99ee049c97abaa7202f328cd65574b8f3301cf3858f9da56b9ffeefb9907c4b7
                                                • Instruction ID: cbae238387ea2f3f88c11249ab11c931d1185f50570c847d6953e9bf19639e27
                                                • Opcode Fuzzy Hash: 99ee049c97abaa7202f328cd65574b8f3301cf3858f9da56b9ffeefb9907c4b7
                                                • Instruction Fuzzy Hash: 52E0D831414A005F5210AB78EC4E4EE775CAE0B336F100715F935C20F0F7B06D508596
                                                Strings
                                                • Variable must be of type 'Object'., xrefs: 00A1428C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable must be of type 'Object'.
                                                • API String ID: 0-109567571
                                                • Opcode ID: c87615186755755e9bd4d34ec90e21e674eb3143e84db3d751ea07a37b835a58
                                                • Instruction ID: 2622e628c368011ded442556c9ea8e5923a66b3adcfa8fa19f9c940de56cb1ef
                                                • Opcode Fuzzy Hash: c87615186755755e9bd4d34ec90e21e674eb3143e84db3d751ea07a37b835a58
                                                • Instruction Fuzzy Hash: D5A29974A44215CFCB24DF98C590AAEB7B6FF58300F24C46AE916AF351D734AD82CB91
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009E0BBB
                                                • timeGetTime.WINMM ref: 009E0E76
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009E0FB3
                                                • TranslateMessage.USER32(?), ref: 009E0FC7
                                                • DispatchMessageW.USER32(?), ref: 009E0FD5
                                                • Sleep.KERNEL32(0000000A), ref: 009E0FDF
                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 009E105A
                                                • DestroyWindow.USER32 ref: 009E1066
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009E1080
                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00A152AD
                                                • TranslateMessage.USER32(?), ref: 00A1608A
                                                • DispatchMessageW.USER32(?), ref: 00A16098
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A160AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                • API String ID: 4003667617-3242690629
                                                • Opcode ID: 173a834b6f644043a3778f9f8838ebbe50db345067ec96d0c885acca12340add
                                                • Instruction ID: 81038c16a2bfbe5cb72cd2be40f6a6f12f69722514faece89da1a5e6d99a83cc
                                                • Opcode Fuzzy Hash: 173a834b6f644043a3778f9f8838ebbe50db345067ec96d0c885acca12340add
                                                • Instruction Fuzzy Hash: 1BB2B170A08781DFD725DF24C884BAAB7E5BFC4304F14891EE49A87291DB75EC85CB92

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00A391E9: __time64.LIBCMT ref: 00A391F3
                                                  • Part of subcall function 009D5045: _fseek.LIBCMT ref: 009D505D
                                                • __wsplitpath.LIBCMT ref: 00A394BE
                                                  • Part of subcall function 009F432E: __wsplitpath_helper.LIBCMT ref: 009F436E
                                                • _wcscpy.LIBCMT ref: 00A394D1
                                                • _wcscat.LIBCMT ref: 00A394E4
                                                • __wsplitpath.LIBCMT ref: 00A39509
                                                • _wcscat.LIBCMT ref: 00A3951F
                                                • _wcscat.LIBCMT ref: 00A39532
                                                  • Part of subcall function 00A3922F: _memmove.LIBCMT ref: 00A39268
                                                  • Part of subcall function 00A3922F: _memmove.LIBCMT ref: 00A39277
                                                • _wcscmp.LIBCMT ref: 00A39479
                                                  • Part of subcall function 00A399BE: _wcscmp.LIBCMT ref: 00A39AAE
                                                  • Part of subcall function 00A399BE: _wcscmp.LIBCMT ref: 00A39AC1
                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A396DC
                                                • _wcsncpy.LIBCMT ref: 00A3974F
                                                • DeleteFileW.KERNEL32(?,?), ref: 00A39785
                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A3979B
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A397AC
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A397BE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                • String ID:
                                                • API String ID: 1500180987-0
                                                • Opcode ID: 062dcf04c971ae5382fb24dd113155cdd1e2de0bdd04a3db45c545f4199d4de6
                                                • Instruction ID: 92fdc3946f7d2fc92c0ca718974ac8ccd2584a39bd9ac42ece28d0aae4f249a1
                                                • Opcode Fuzzy Hash: 062dcf04c971ae5382fb24dd113155cdd1e2de0bdd04a3db45c545f4199d4de6
                                                • Instruction Fuzzy Hash: 93C12BB1D00219AFDF21DF94CD85AEFB7BDAF95340F0040AAF609E6251DB709A848F65

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 009D3074
                                                • RegisterClassExW.USER32(00000030), ref: 009D309E
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D30AF
                                                • InitCommonControlsEx.COMCTL32(?), ref: 009D30CC
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D30DC
                                                • LoadIconW.USER32(000000A9), ref: 009D30F2
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D3101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 85831f1415aac6685a51d53c8be923d9b7ba96ca24dec200d01768861798eb57
                                                • Instruction ID: 2b2e1b467a94263ac291902b2ff5d21a655a176fac00e4b9b752c79e2742641d
                                                • Opcode Fuzzy Hash: 85831f1415aac6685a51d53c8be923d9b7ba96ca24dec200d01768861798eb57
                                                • Instruction Fuzzy Hash: E83103B1941349AFDB10CFE4E889AD9BBF0FF09311F14856AE990A62A0E7B50586CF51

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 009D3074
                                                • RegisterClassExW.USER32(00000030), ref: 009D309E
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D30AF
                                                • InitCommonControlsEx.COMCTL32(?), ref: 009D30CC
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D30DC
                                                • LoadIconW.USER32(000000A9), ref: 009D30F2
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D3101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 7bffd95a5948184f09ee811c2bf8f0ec4fd5f60d68fd14c6af0648599cd4c76a
                                                • Instruction ID: 0dfdf6c26e7b13462ed2c20d8537c51491ecdbb0099808130eef67929c96b2da
                                                • Opcode Fuzzy Hash: 7bffd95a5948184f09ee811c2bf8f0ec4fd5f60d68fd14c6af0648599cd4c76a
                                                • Instruction Fuzzy Hash: 3121C5B5E51318AFDB00DFE4E849BDDBBF4FB08711F00812AF910A62A0DBB145468F91

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 009D4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A962F8,?,009D37C0,?), ref: 009D4882
                                                  • Part of subcall function 009F074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,009D72C5), ref: 009F0771
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009D7308
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A0ECF1
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A0ED32
                                                • RegCloseKey.ADVAPI32(?), ref: 00A0ED70
                                                • _wcscat.LIBCMT ref: 00A0EDC9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 2673923337-2727554177
                                                • Opcode ID: e0cd1bfe86e3586f96742c0b98fe153b80439ba811aad2f4122fa33694139753
                                                • Instruction ID: c7aa4b55e014997119b28bf0954fe52672409d41b491061cd26bada64a95073c
                                                • Opcode Fuzzy Hash: e0cd1bfe86e3586f96742c0b98fe153b80439ba811aad2f4122fa33694139753
                                                • Instruction Fuzzy Hash: AC7170716683059EC714EFA5EC81AAFBBE8FF94340F44492FF545832A0EB309949CB61

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 009D3A62
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 009D3A71
                                                • LoadIconW.USER32(00000063), ref: 009D3A88
                                                • LoadIconW.USER32(000000A4), ref: 009D3A9A
                                                • LoadIconW.USER32(000000A2), ref: 009D3AAC
                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009D3AD2
                                                • RegisterClassExW.USER32(?), ref: 009D3B28
                                                  • Part of subcall function 009D3041: GetSysColorBrush.USER32(0000000F), ref: 009D3074
                                                  • Part of subcall function 009D3041: RegisterClassExW.USER32(00000030), ref: 009D309E
                                                  • Part of subcall function 009D3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D30AF
                                                  • Part of subcall function 009D3041: InitCommonControlsEx.COMCTL32(?), ref: 009D30CC
                                                  • Part of subcall function 009D3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D30DC
                                                  • Part of subcall function 009D3041: LoadIconW.USER32(000000A9), ref: 009D30F2
                                                  • Part of subcall function 009D3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D3101
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: 4f082e5011c85c3792f14f30b63f865b9989e1f5eff322289a0aeaa554dc29ee
                                                • Instruction ID: d7b4ee9524db3d20d2bb8cc19d29bed1cff2c1eedda3311406389daf28686284
                                                • Opcode Fuzzy Hash: 4f082e5011c85c3792f14f30b63f865b9989e1f5eff322289a0aeaa554dc29ee
                                                • Instruction Fuzzy Hash: 622117B1E40308AFEB10DFE4EC49BDD7BB4FB08711F00416AF504A62A0DBBA56569F94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 767 9d3633-9d3681 769 9d36e1-9d36e3 767->769 770 9d3683-9d3686 767->770 769->770 773 9d36e5 769->773 771 9d3688-9d368f 770->771 772 9d36e7 770->772 774 9d375d-9d3765 PostQuitMessage 771->774 775 9d3695-9d369a 771->775 777 9d36ed-9d36f0 772->777 778 a0d31c-a0d34a call 9e11d0 call 9e11f3 772->778 776 9d36ca-9d36d2 DefWindowProcW 773->776 783 9d3711-9d3713 774->783 779 9d36a0-9d36a2 775->779 780 a0d38f-a0d3a3 call a32a16 775->780 782 9d36d8-9d36de 776->782 784 9d3715-9d373c SetTimer RegisterWindowMessageW 777->784 785 9d36f2-9d36f3 777->785 813 a0d34f-a0d356 778->813 786 9d36a8-9d36ad 779->786 787 9d3767-9d3776 call 9d4531 779->787 780->783 804 a0d3a9 780->804 783->782 784->783 788 9d373e-9d3749 CreatePopupMenu 784->788 791 9d36f9-9d370c KillTimer call 9d44cb call 9d3114 785->791 792 a0d2bf-a0d2c2 785->792 793 a0d374-a0d37b 786->793 794 9d36b3-9d36b8 786->794 787->783 788->783 791->783 798 a0d2c4-a0d2c6 792->798 799 a0d2f8-a0d317 MoveWindow 792->799 793->776 801 a0d381-a0d38a call a2817e 793->801 802 9d36be-9d36c4 794->802 803 9d374b-9d375b call 9d45df 794->803 807 a0d2e7-a0d2f3 SetFocus 798->807 808 a0d2c8-a0d2cb 798->808 799->783 801->776 802->776 802->813 803->783 804->776 807->783 808->802 814 a0d2d1-a0d2e2 call 9e11d0 808->814 813->776 817 a0d35c-a0d36f call 9d44cb call 9d43db 813->817 814->783 817->776
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?), ref: 009D36D2
                                                • KillTimer.USER32(?,00000001), ref: 009D36FC
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009D371F
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D372A
                                                • CreatePopupMenu.USER32 ref: 009D373E
                                                • PostQuitMessage.USER32(00000000), ref: 009D375F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: 42d5bba9a51e65990e6147bd2a0c3205af6c21a8ebb229b0483fb74f1272b7a5
                                                • Instruction ID: 9a745bc2fd591ae404af6c3f533de8765c6066a036fef9771a2e5b1b490ba5ce
                                                • Opcode Fuzzy Hash: 42d5bba9a51e65990e6147bd2a0c3205af6c21a8ebb229b0483fb74f1272b7a5
                                                • Instruction Fuzzy Hash: A64116B2284605BBDF109BA4EC4ABBA3B98EF44342F04C52BF502963E1DA759D119663

                                                Control-flow Graph

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                • API String ID: 1825951767-3513169116
                                                • Opcode ID: 25480f240342f3b3709e3c4ff82cf4cb2a2b8c0b9de82a0e0f10717bdf5b1c0a
                                                • Instruction ID: b9b02b00db9e72735152165e3359d4ffe4087cd11da863360c87b84b9d6cf672
                                                • Opcode Fuzzy Hash: 25480f240342f3b3709e3c4ff82cf4cb2a2b8c0b9de82a0e0f10717bdf5b1c0a
                                                • Instruction Fuzzy Hash: 1CA14D72D5022DAACB04EBE4DC91BEEB778BF54340F44852AE412B7291EF745A09CB61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 942 9925d0-99267e call 990000 945 992685-9926ab call 9934e0 CreateFileW 942->945 948 9926ad 945->948 949 9926b2-9926c2 945->949 950 9927fd-992801 948->950 957 9926c9-9926e3 VirtualAlloc 949->957 958 9926c4 949->958 951 992843-992846 950->951 952 992803-992807 950->952 954 992849-992850 951->954 955 992809-99280c 952->955 956 992813-992817 952->956 961 992852-99285d 954->961 962 9928a5-9928ba 954->962 955->956 963 992819-992823 956->963 964 992827-99282b 956->964 959 9926ea-992701 ReadFile 957->959 960 9926e5 957->960 958->950 965 992708-992748 VirtualAlloc 959->965 966 992703 959->966 960->950 967 99285f 961->967 968 992861-99286d 961->968 969 9928ca-9928d2 962->969 970 9928bc-9928c7 VirtualFree 962->970 963->964 971 99283b 964->971 972 99282d-992837 964->972 973 99274a 965->973 974 99274f-99276a call 993730 965->974 966->950 967->962 975 99286f-99287f 968->975 976 992881-99288d 968->976 970->969 971->951 972->971 973->950 982 992775-99277f 974->982 978 9928a3 975->978 979 99289a-9928a0 976->979 980 99288f-992898 976->980 978->954 979->978 980->978 983 992781-9927b0 call 993730 982->983 984 9927b2-9927c6 call 993540 982->984 983->982 989 9927c8 984->989 990 9927ca-9927ce 984->990 989->950 992 9927da-9927de 990->992 993 9927d0-9927d4 FindCloseChangeNotification 990->993 994 9927ee-9927f7 992->994 995 9927e0-9927eb VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 009926A1
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 009928C7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateFileFreeVirtual
                                                • String ID:
                                                • API String ID: 204039940-0
                                                • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                • Instruction ID: 4b0b9de5026f9cf05813fc7b2f1c2853ca37ccafaf3e7f847909cf248dd91009
                                                • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                • Instruction Fuzzy Hash: 84A10774E04209EBDF14CFE8C994BEEB7B5BF48304F208559E511BB280D779AA81DB64

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1073 9d39e7-9d3a57 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009D3A15
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009D3A36
                                                • ShowWindow.USER32(00000000,?,?), ref: 009D3A4A
                                                • ShowWindow.USER32(00000000,?,?), ref: 009D3A53
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: c718516c1e24fe1d69e6d1036b8a2832ca2db883146b4bd5f1a260133b381fc6
                                                • Instruction ID: fd04438315543be5b7a29d0b91ef15246903db20260cdaa6f8cab2a2284a120c
                                                • Opcode Fuzzy Hash: c718516c1e24fe1d69e6d1036b8a2832ca2db883146b4bd5f1a260133b381fc6
                                                • Instruction Fuzzy Hash: C4F0D071B412907EEA3197976C49EA72E7DEBC6F51B00412AB904A21B0CAB51852DAB0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1074 9923b0-9924d2 call 990000 call 9922a0 CreateFileW 1081 9924d9-9924e9 1074->1081 1082 9924d4 1074->1082 1085 9924eb 1081->1085 1086 9924f0-99250a VirtualAlloc 1081->1086 1083 992589-99258e 1082->1083 1085->1083 1087 99250c 1086->1087 1088 99250e-992525 ReadFile 1086->1088 1087->1083 1089 992529-992563 call 9922e0 call 9912a0 1088->1089 1090 992527 1088->1090 1095 99257f-992587 ExitProcess 1089->1095 1096 992565-99257a call 992330 1089->1096 1090->1083 1095->1083 1096->1095
                                                APIs
                                                  • Part of subcall function 009922A0: Sleep.KERNELBASE(000001F4), ref: 009922B1
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 009924C8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: 87PEHZ7PPBWGA2PN
                                                • API String ID: 2694422964-3100532331
                                                • Opcode ID: b2aafc5a8d4a2b3d15a482cc431bda9b7e1c1cdacc955934e0786f5efec50e29
                                                • Instruction ID: d8748d81cf893e1a7543208bf2d061c69e59931ee87649f53bf660a60f2a4872
                                                • Opcode Fuzzy Hash: b2aafc5a8d4a2b3d15a482cc431bda9b7e1c1cdacc955934e0786f5efec50e29
                                                • Instruction Fuzzy Hash: 74518330D04249EBEF11DBA8C815BEEBB79AF54300F004598F218BB2C0D7B91B45CBA6

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1098 9d410d-9d4123 1099 9d4129-9d413e call 9d7b76 1098->1099 1100 9d4200-9d4204 1098->1100 1103 9d4144-9d4164 call 9d7d2c 1099->1103 1104 a0d5dd-a0d5ec LoadStringW 1099->1104 1107 a0d5f7-a0d60f call 9d7c8e call 9d7143 1103->1107 1108 9d416a-9d416e 1103->1108 1104->1107 1116 9d417e-9d41fb call 9f3020 call 9d463e call 9f2ffc Shell_NotifyIconW call 9d5a64 1107->1116 1120 a0d615-a0d633 call 9d7e0b call 9d7143 call 9d7e0b 1107->1120 1110 9d4205-9d420e call 9d81a7 1108->1110 1111 9d4174-9d4179 call 9d7c8e 1108->1111 1110->1116 1111->1116 1116->1100 1120->1116
                                                APIs
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A0D5EC
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                • _memset.LIBCMT ref: 009D418D
                                                • _wcscpy.LIBCMT ref: 009D41E1
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009D41F1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                • String ID: Line:
                                                • API String ID: 3942752672-1585850449
                                                • Opcode ID: d244c8bfb00a4629d19266cfe31efbc6beda75829476f8631459040b89a0cb6f
                                                • Instruction ID: 5b5e25a71862b843ea0de958e1608aeb448dc37fb645c5576ef1782076ca8a88
                                                • Opcode Fuzzy Hash: d244c8bfb00a4629d19266cfe31efbc6beda75829476f8631459040b89a0cb6f
                                                • Instruction Fuzzy Hash: 8B31D171548304AFD721EBA0DC46BDBB7ECAF94300F108A1FF185922A1EF74A649C792

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1133 9f564d-9f5666 1134 9f5668-9f566d 1133->1134 1135 9f5683 1133->1135 1134->1135 1136 9f566f-9f5671 1134->1136 1137 9f5685-9f568b 1135->1137 1138 9f568c-9f5691 1136->1138 1139 9f5673-9f5678 call 9f8d68 1136->1139 1141 9f569f-9f56a3 1138->1141 1142 9f5693-9f569d 1138->1142 1149 9f567e call 9f8ff6 1139->1149 1145 9f56a5-9f56b0 call 9f3020 1141->1145 1146 9f56b3-9f56b5 1141->1146 1142->1141 1144 9f56c3-9f56d2 1142->1144 1147 9f56d9 1144->1147 1148 9f56d4-9f56d7 1144->1148 1145->1146 1146->1139 1151 9f56b7-9f56c1 1146->1151 1152 9f56de-9f56e3 1147->1152 1148->1152 1149->1135 1151->1139 1151->1144 1155 9f57cc-9f57cf 1152->1155 1156 9f56e9-9f56f0 1152->1156 1155->1137 1157 9f56f2-9f56fa 1156->1157 1158 9f5731-9f5733 1156->1158 1157->1158 1159 9f56fc 1157->1159 1160 9f579d-9f579e call a00df7 1158->1160 1161 9f5735-9f5737 1158->1161 1162 9f57fa 1159->1162 1163 9f5702-9f5704 1159->1163 1167 9f57a3-9f57a7 1160->1167 1165 9f575b-9f5766 1161->1165 1166 9f5739-9f5741 1161->1166 1174 9f57fe-9f5807 1162->1174 1172 9f570b-9f5710 1163->1172 1173 9f5706-9f5708 1163->1173 1170 9f576a-9f576d 1165->1170 1171 9f5768 1165->1171 1168 9f5743-9f574f 1166->1168 1169 9f5751-9f5755 1166->1169 1167->1174 1175 9f57a9-9f57ae 1167->1175 1176 9f5757-9f5759 1168->1176 1169->1176 1177 9f576f-9f577b call 9f4916 call a010ab 1170->1177 1178 9f57d4-9f57d8 1170->1178 1171->1170 1172->1178 1179 9f5716-9f572f call a00f18 1172->1179 1173->1172 1174->1137 1175->1178 1180 9f57b0-9f57c1 1175->1180 1176->1170 1194 9f5780-9f5785 1177->1194 1181 9f57ea-9f57f5 call 9f8d68 1178->1181 1182 9f57da-9f57e7 call 9f3020 1178->1182 1193 9f5792-9f579b 1179->1193 1185 9f57c4-9f57c6 1180->1185 1181->1149 1182->1181 1185->1155 1185->1156 1193->1185 1195 9f580c-9f5810 1194->1195 1196 9f578b-9f578e 1194->1196 1195->1174 1196->1162 1197 9f5790 1196->1197 1197->1193
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                • String ID:
                                                • API String ID: 1559183368-0
                                                • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                • Instruction ID: 395178bb337f8d19fc1ff645be81e8c296cd9444000c5c283bc26de8abe42a2d
                                                • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                • Instruction Fuzzy Hash: 3051B270A00B0DDBDB24AFB9C88467E77A9AF40324F668729FB35D62D0DB749D518B40
                                                APIs
                                                  • Part of subcall function 009D4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00A962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009D4F6F
                                                • _free.LIBCMT ref: 00A0E68C
                                                • _free.LIBCMT ref: 00A0E6D3
                                                  • Part of subcall function 009D6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009D6D0D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                • API String ID: 2861923089-1757145024
                                                • Opcode ID: 85e3d510ec631bb1d8ce01c066c18f67de60c64d23f3811fbcdfcf3509627011
                                                • Instruction ID: 22dfb60d65fa4b358a497cd6bdc3d58f3053557731091fe6d7fbf83298b2e56a
                                                • Opcode Fuzzy Hash: 85e3d510ec631bb1d8ce01c066c18f67de60c64d23f3811fbcdfcf3509627011
                                                • Instruction Fuzzy Hash: D9916D71910219EFCF04EFA8DC91AEDB7B4BF55314F14886AF815AB2A1EB31A904DB50
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,009D35A1,SwapMouseButtons,00000004,?), ref: 009D35D4
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,009D35A1,SwapMouseButtons,00000004,?,?,?,?,009D2754), ref: 009D35F5
                                                • RegCloseKey.KERNELBASE(00000000,?,?,009D35A1,SwapMouseButtons,00000004,?,?,?,?,009D2754), ref: 009D3617
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 24eebfc621676ec6933b7c3b3fb0da53897f9763a2fb16c16d56bc5c7a26d1d9
                                                • Instruction ID: cf0bd6fafda3d1fe0d3d4b1ba25fca6ccac1157b17d0140a4be02255c7c6c0ea
                                                • Opcode Fuzzy Hash: 24eebfc621676ec6933b7c3b3fb0da53897f9763a2fb16c16d56bc5c7a26d1d9
                                                • Instruction Fuzzy Hash: BA113375650208BEDB20CFA5DC81EAEBBACEF04742F40846AA805D7210E2719E419BA1
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00991ACD
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00991AF1
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00991B13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                • Instruction ID: 2ee63aea4efb780da8b6a503103bb5cbd8500448b5894b418f3a29d047f34016
                                                • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                • Instruction Fuzzy Hash: 56620930A14259DBEB24CFA4C841BDEB376FF58300F1095A9D10DEB294E77A9E81CB59
                                                APIs
                                                  • Part of subcall function 009D5045: _fseek.LIBCMT ref: 009D505D
                                                  • Part of subcall function 00A399BE: _wcscmp.LIBCMT ref: 00A39AAE
                                                  • Part of subcall function 00A399BE: _wcscmp.LIBCMT ref: 00A39AC1
                                                • _free.LIBCMT ref: 00A3992C
                                                • _free.LIBCMT ref: 00A39933
                                                • _free.LIBCMT ref: 00A3999E
                                                  • Part of subcall function 009F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,009F9C64), ref: 009F2FA9
                                                  • Part of subcall function 009F2F95: GetLastError.KERNEL32(00000000,?,009F9C64), ref: 009F2FBB
                                                • _free.LIBCMT ref: 00A399A6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                • String ID:
                                                • API String ID: 1552873950-0
                                                • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                • Instruction ID: 24324fc07a88e58a8000ad5c95aa6ceeb33cfa4852865bbc0844b7ad5f57298c
                                                • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                • Instruction Fuzzy Hash: 855140B1904218AFDF249F64DC41BAEBB79EF88310F1044AEB609A7351DB755E80CF59
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                • String ID:
                                                • API String ID: 2782032738-0
                                                • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                • Instruction ID: 9631ebe2bee7337dab5de1474e539dddcea2e004ad0707383061d119af89daa9
                                                • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                • Instruction Fuzzy Hash: 3F41D87074070E9BDF18CE69C8809BF77AAEF80760B24853DEA55C7650D770DD908B44
                                                APIs
                                                • _memset.LIBCMT ref: 00A0EE62
                                                • GetOpenFileNameW.COMDLG32(?), ref: 00A0EEAC
                                                  • Part of subcall function 009D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D48A1,?,?,009D37C0,?), ref: 009D48CE
                                                  • Part of subcall function 009F09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009F09F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                • String ID: X
                                                • API String ID: 3777226403-3081909835
                                                • Opcode ID: b2b401dadbc928bcce653aaa3ca996c68a872f5b7c8e5d41cb96f1acbf2ae5ff
                                                • Instruction ID: 79a8ffc60e47ca25aacd8e6de2a2d07f9f217ab0a3733c7a70e517a936642273
                                                • Opcode Fuzzy Hash: b2b401dadbc928bcce653aaa3ca996c68a872f5b7c8e5d41cb96f1acbf2ae5ff
                                                • Instruction Fuzzy Hash: 9721C670A0025C9BCB05DFD4C8457EEBBFD9F49300F04801AE508E7381EBB859898BA1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __fread_nolock_memmove
                                                • String ID: EA06
                                                • API String ID: 1988441806-3962188686
                                                • Opcode ID: 1d0a486fdec6e63db4fd63c6d4e8d6caa752934bf3c9cea078813cd9fa6bf77f
                                                • Instruction ID: 9b1085ff6ded4f587de4373b3a80aa20e59198085a08bec64259960376f64423
                                                • Opcode Fuzzy Hash: 1d0a486fdec6e63db4fd63c6d4e8d6caa752934bf3c9cea078813cd9fa6bf77f
                                                • Instruction Fuzzy Hash: 0C01F971804218BEDB28C7A8C816FFE7BF89B11311F00419BF652D2181E5B5A6148BA0
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00A39B82
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00A39B99
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: f731fd8bab72cd4c982cd4391586cbe6f7b422ef0824871b412015788c8a5283
                                                • Instruction ID: ed338363cd1d15534ce45ec4d823b488de4fdfe27c9b2c90872dccaa2061abf9
                                                • Opcode Fuzzy Hash: f731fd8bab72cd4c982cd4391586cbe6f7b422ef0824871b412015788c8a5283
                                                • Instruction Fuzzy Hash: 5AD05EB954030DBFDB10EBD0DC0EFDA772CF714701F0046A1BE54960A1DEB055998B92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 545c9c186842800c6f1a7e664f40961d990997ca1fa1f20e1bde77736efd6d5c
                                                • Instruction ID: 7aabe677b67d0f1e6041f6ece9ce96f9fbf05a2718c0ddf79adf66f5c3b65f51
                                                • Opcode Fuzzy Hash: 545c9c186842800c6f1a7e664f40961d990997ca1fa1f20e1bde77736efd6d5c
                                                • Instruction Fuzzy Hash: 42F11575A083019FCB14DF28C584A6ABBE5BFC8314F14892EF89A9B351D771E945CF82
                                                APIs
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F03D3
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 009F03DB
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F03E6
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F03F1
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 009F03F9
                                                  • Part of subcall function 009F03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 009F0401
                                                  • Part of subcall function 009E6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,009DFA90), ref: 009E62B4
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009DFB2D
                                                • OleInitialize.OLE32(00000000), ref: 009DFBAA
                                                • CloseHandle.KERNEL32(00000000), ref: 00A149F2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: 9ab9eb12c7518ac849f4e89ebd1c072a2bf1b98ec10db36d56c3a537689996f8
                                                • Instruction ID: 7f833eeab1a74679751abd50f7d1c676df61afb55b50182b558db16fd4aa6d65
                                                • Opcode Fuzzy Hash: 9ab9eb12c7518ac849f4e89ebd1c072a2bf1b98ec10db36d56c3a537689996f8
                                                • Instruction Fuzzy Hash: F88196B4B452508FCB84EFFAAA9165A7BE4FF98748710852B9019CB362EF358406CF51
                                                APIs
                                                • _memset.LIBCMT ref: 009D4401
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009D44A6
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009D44C3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$_memset
                                                • String ID:
                                                • API String ID: 1505330794-0
                                                • Opcode ID: 7d110c3a9d742089973a1e20b0fcd52d9bffe84b9a50ca3f487353f69cde28a6
                                                • Instruction ID: f5efa14e873d90a99593663166e494b6379608bbf5b7f4983e72179c16c8b47d
                                                • Opcode Fuzzy Hash: 7d110c3a9d742089973a1e20b0fcd52d9bffe84b9a50ca3f487353f69cde28a6
                                                • Instruction Fuzzy Hash: EC315EB1A087018FD720DF64D88479BBBF8BB48304F00492FF59A87391DB75A984CB92
                                                APIs
                                                • __FF_MSGBANNER.LIBCMT ref: 009F5963
                                                  • Part of subcall function 009FA3AB: __NMSG_WRITE.LIBCMT ref: 009FA3D2
                                                  • Part of subcall function 009FA3AB: __NMSG_WRITE.LIBCMT ref: 009FA3DC
                                                • __NMSG_WRITE.LIBCMT ref: 009F596A
                                                  • Part of subcall function 009FA408: GetModuleFileNameW.KERNEL32(00000000,00A943BA,00000104,?,00000001,00000000), ref: 009FA49A
                                                  • Part of subcall function 009FA408: ___crtMessageBoxW.LIBCMT ref: 009FA548
                                                  • Part of subcall function 009F32DF: ___crtCorExitProcess.LIBCMT ref: 009F32E5
                                                  • Part of subcall function 009F32DF: ExitProcess.KERNEL32 ref: 009F32EE
                                                  • Part of subcall function 009F8D68: __getptd_noexit.LIBCMT ref: 009F8D68
                                                • RtlAllocateHeap.NTDLL(01380000,00000000,00000001,00000000,?,?,?,009F1013,?), ref: 009F598F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                • String ID:
                                                • API String ID: 1372826849-0
                                                • Opcode ID: a657b0a6054a87c99ded84073b20453901b58ab3ca227d999c7b3b6282c01f14
                                                • Instruction ID: c9242fa4f93275e892cd4dcb84a7f1f4824e8f5f38b0cb60f7c549d4917008ec
                                                • Opcode Fuzzy Hash: a657b0a6054a87c99ded84073b20453901b58ab3ca227d999c7b3b6282c01f14
                                                • Instruction Fuzzy Hash: 8401D271300B1EEEE6296B64D842B7E738C9F81731F92002AF7049A1C1DEB49D828360
                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00A397D2,?,?,?,?,?,00000004), ref: 00A39B45
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00A397D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00A39B5B
                                                • CloseHandle.KERNEL32(00000000,?,00A397D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A39B62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: ad0c852a5e07c37477f9cb4e5ba9ee97eb30ab303992729c3f9b147eb04062f2
                                                • Instruction ID: 273a600af3d3c03f2a924ebfdcc783463e011df93a224fa4d7536447676fc4e9
                                                • Opcode Fuzzy Hash: ad0c852a5e07c37477f9cb4e5ba9ee97eb30ab303992729c3f9b147eb04062f2
                                                • Instruction Fuzzy Hash: FBE08632181714BBE7216F94EC09FCA7B18BB05772F104220FB24A90E087B125129798
                                                APIs
                                                • _free.LIBCMT ref: 00A38FA5
                                                  • Part of subcall function 009F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,009F9C64), ref: 009F2FA9
                                                  • Part of subcall function 009F2F95: GetLastError.KERNEL32(00000000,?,009F9C64), ref: 009F2FBB
                                                • _free.LIBCMT ref: 00A38FB6
                                                • _free.LIBCMT ref: 00A38FC8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                • Instruction ID: f09ea0917bb025ae3f8d8b3cc83bf2e7f9c5864b9a3073f39827eb61a8c282b5
                                                • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                • Instruction Fuzzy Hash: 65E017A161D7054BCA24A778AD40BA367FE5F88360B18081EBA09DB182DE28E8418628
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: CALL
                                                • API String ID: 0-4196123274
                                                • Opcode ID: 77a486cd6394156522e69d56a0bf087d248fca45a9ea0e376c5b30df4d7e6869
                                                • Instruction ID: d9e789169bd6d6d1b80d7869c58b3bb5040f6eaffbd3edc4f1e9f2cea597f5fc
                                                • Opcode Fuzzy Hash: 77a486cd6394156522e69d56a0bf087d248fca45a9ea0e376c5b30df4d7e6869
                                                • Instruction Fuzzy Hash: 74224874548251DFCB24DF14C590B6ABBE5BF84300F19C95EE88A8B362D775ED81CB82
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID: EA06
                                                • API String ID: 4104443479-3962188686
                                                • Opcode ID: 57408072d572925b95167c7a9109cfeeceeee8064b1e8c24f93cc7addef39253
                                                • Instruction ID: 30ce1aef44f81d374cb64a03fcf6ba6ccf0bb04b9156ef6144d5795280308b0e
                                                • Opcode Fuzzy Hash: 57408072d572925b95167c7a9109cfeeceeee8064b1e8c24f93cc7addef39253
                                                • Instruction Fuzzy Hash: BE419C22A841587BDF214B64D8917BE7FA6AF81300F68C477E8869B382C6358D4087F2
                                                APIs
                                                • IsThemeActive.UXTHEME ref: 009D4992
                                                  • Part of subcall function 009F35AC: __lock.LIBCMT ref: 009F35B2
                                                  • Part of subcall function 009F35AC: DecodePointer.KERNEL32(00000001,?,009D49A7,00A281BC), ref: 009F35BE
                                                  • Part of subcall function 009F35AC: EncodePointer.KERNEL32(?,?,009D49A7,00A281BC), ref: 009F35C9
                                                  • Part of subcall function 009D4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 009D4A73
                                                  • Part of subcall function 009D4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009D4A88
                                                  • Part of subcall function 009D3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009D3B7A
                                                  • Part of subcall function 009D3B4C: IsDebuggerPresent.KERNEL32 ref: 009D3B8C
                                                  • Part of subcall function 009D3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00A962F8,00A962E0,?,?), ref: 009D3BFD
                                                  • Part of subcall function 009D3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 009D3C81
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009D49D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                • String ID:
                                                • API String ID: 1438897964-0
                                                • Opcode ID: 7ae80153d51067fa13cb1ae4188cf9412c879174cc62875c88e27853cc92a839
                                                • Instruction ID: ecfcba2d1e7460bd9b7b9daff34c91c34fed4286051bb970a1a6fea4372f3120
                                                • Opcode Fuzzy Hash: 7ae80153d51067fa13cb1ae4188cf9412c879174cc62875c88e27853cc92a839
                                                • Instruction Fuzzy Hash: A7118CB1A583119FC700EFA9EC05A5ABBE8EFD8710F00891FF045832A1DB709946CB96
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,009D5981,?,?,?,?), ref: 009D5E27
                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,009D5981,?,?,?,?), ref: 00A0E19C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 15782a9e0afb2b1749abfdd76de6b4b3b0351c5ab6baeb340f6c71c7a48d95aa
                                                • Instruction ID: a33c0bf4acb4b235bf767152b302e68316b7ab6054bc1c3dea6f2989c9fc45cb
                                                • Opcode Fuzzy Hash: 15782a9e0afb2b1749abfdd76de6b4b3b0351c5ab6baeb340f6c71c7a48d95aa
                                                • Instruction Fuzzy Hash: BD01B570284708BEF3245E64DC8AF667B9CFB01768F10C719BAE55A2E0C6B41E45CB60
                                                APIs
                                                  • Part of subcall function 009F594C: __FF_MSGBANNER.LIBCMT ref: 009F5963
                                                  • Part of subcall function 009F594C: __NMSG_WRITE.LIBCMT ref: 009F596A
                                                  • Part of subcall function 009F594C: RtlAllocateHeap.NTDLL(01380000,00000000,00000001,00000000,?,?,?,009F1013,?), ref: 009F598F
                                                • std::exception::exception.LIBCMT ref: 009F102C
                                                • __CxxThrowException@8.LIBCMT ref: 009F1041
                                                  • Part of subcall function 009F87DB: RaiseException.KERNEL32(?,?,?,00A8BAF8,00000000,?,?,?,?,009F1046,?,00A8BAF8,?,00000001), ref: 009F8830
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 3902256705-0
                                                • Opcode ID: e2bd547cf6acd1bd239a036c851958a6fd9b57cc77cf623394f9272fe92f4709
                                                • Instruction ID: 26517d9dce2216d151ac7ffb4fa0ed82b12b0ab318fe0ac7e377e9d253b705aa
                                                • Opcode Fuzzy Hash: e2bd547cf6acd1bd239a036c851958a6fd9b57cc77cf623394f9272fe92f4709
                                                • Instruction Fuzzy Hash: F1F0C83554061DF7CB24BA58EC05BFFB7ACAF41391F244426FA04A6592EFB18A8097E0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __lock_file_memset
                                                • String ID:
                                                • API String ID: 26237723-0
                                                • Opcode ID: 9037bfc2fb4c237b44f134d455841038adc0ac62d49d3db5d4e59bdb8614b50c
                                                • Instruction ID: 965305099e9c7128c15a942dd7f4255286688528c2886bdb97c7572dc1fc16bd
                                                • Opcode Fuzzy Hash: 9037bfc2fb4c237b44f134d455841038adc0ac62d49d3db5d4e59bdb8614b50c
                                                • Instruction Fuzzy Hash: CA018471800A0CEBCF12AF699C016BF7B65AFC03A0F158215BB245B1A1DB358A21DB91
                                                APIs
                                                  • Part of subcall function 009F8D68: __getptd_noexit.LIBCMT ref: 009F8D68
                                                • __lock_file.LIBCMT ref: 009F561B
                                                  • Part of subcall function 009F6E4E: __lock.LIBCMT ref: 009F6E71
                                                • __fclose_nolock.LIBCMT ref: 009F5626
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                • String ID:
                                                • API String ID: 2800547568-0
                                                • Opcode ID: e667c5c890b700f3924d6b4bb45800bab89f1a2cfcc7bb0b4c0aa53c323ea10f
                                                • Instruction ID: 73fc13d028ffe41be5953b6086dd65afd5577209f8c0887c06655da26e3832de
                                                • Opcode Fuzzy Hash: e667c5c890b700f3924d6b4bb45800bab89f1a2cfcc7bb0b4c0aa53c323ea10f
                                                • Instruction Fuzzy Hash: C5F09072900A0C9BDB60AF75880277E66A16F80734F668209A724EB1C1CF7C89029B55
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00991ACD
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00991AF1
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00991B13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                • Instruction ID: 07a62458f53f4ebdb9d18e275791dbc4d3eb055c4247c7606eb4080776b7d601
                                                • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                • Instruction Fuzzy Hash: 3812BE24E18658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4F81CB5A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: baac84988e91cc438004bfc7d602ab60b347d4956ea46414d000c53d67e0667b
                                                • Instruction ID: b514a893791294251581ddcccfa9bc6128b412e0fc79120b0696fc56321c09ea
                                                • Opcode Fuzzy Hash: baac84988e91cc438004bfc7d602ab60b347d4956ea46414d000c53d67e0667b
                                                • Instruction Fuzzy Hash: 00519D34640614AFCF15EF68C991FAE77BAAF85310F158469F906AB382CB34EE00CB51
                                                APIs
                                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 009D5CF6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: d246d779c89118689fa79187405edc750d4347b884c71738a0b8c4ecef03e35a
                                                • Instruction ID: 409ffcaac31cc8be1ddb34beee96cd254dfbb1ab60739047d390636ce98b05a6
                                                • Opcode Fuzzy Hash: d246d779c89118689fa79187405edc750d4347b884c71738a0b8c4ecef03e35a
                                                • Instruction Fuzzy Hash: 17316C31A10B09AFCB18DF2DC484A6DB7B6FF88310F15C62AE81993750D771B960DB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 5dba8b7ae81d22baabfd2924a9a132cfc58f23f1159b6c93535550219537be14
                                                • Instruction ID: 6afd35da6bb4a18fdfc37970804040c1cb5d22efcbc64cc6c714680b8803e5e7
                                                • Opcode Fuzzy Hash: 5dba8b7ae81d22baabfd2924a9a132cfc58f23f1159b6c93535550219537be14
                                                • Instruction Fuzzy Hash: 18414574508341DFDB24DF14C484B1ABBE1BF85318F0989ADE8898B362C776EC85CB92
                                                APIs
                                                  • Part of subcall function 009D4D13: FreeLibrary.KERNEL32(00000000,?), ref: 009D4D4D
                                                  • Part of subcall function 009F548B: __wfsopen.LIBCMT ref: 009F5496
                                                • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00A962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009D4F6F
                                                  • Part of subcall function 009D4CC8: FreeLibrary.KERNEL32(00000000), ref: 009D4D02
                                                  • Part of subcall function 009D4DD0: _memmove.LIBCMT ref: 009D4E1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                • String ID:
                                                • API String ID: 1396898556-0
                                                • Opcode ID: ef3bf1ce148d3ade8c32b417866d38fcf3d3784913c28f86af97e8e167e9340a
                                                • Instruction ID: 15be8bc11590aecf32216a0132932ef0b2949cbd8b78d4805acdae6bdb3ee315
                                                • Opcode Fuzzy Hash: ef3bf1ce148d3ade8c32b417866d38fcf3d3784913c28f86af97e8e167e9340a
                                                • Instruction Fuzzy Hash: 92110A32680709ABCB20FF74DC02FAE77A59F84701F11C82EF585A63D1DE759A159750
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 361a8fb846163cd10e4795a3739ed39114ec7c1f889ab59400b0cc6a8bf9844b
                                                • Instruction ID: 41cd253244eb6c47471c9c09ce2f95eb38ce7a4452c73c77e08fd208d7c95316
                                                • Opcode Fuzzy Hash: 361a8fb846163cd10e4795a3739ed39114ec7c1f889ab59400b0cc6a8bf9844b
                                                • Instruction Fuzzy Hash: CA2122B4548341DFCB24DF54C444B5ABBE4BF88304F098969F98A47761D731E899CBA3
                                                APIs
                                                • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,009D5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 009D5D76
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 24df74549cf7772b86e24811ab78391013b143295feaffa081a11d5eb7c36050
                                                • Instruction ID: 7d4161dba776f45ca2d2c45f0487f45b7be0b318fdc883b23ad8b65a75ee9891
                                                • Opcode Fuzzy Hash: 24df74549cf7772b86e24811ab78391013b143295feaffa081a11d5eb7c36050
                                                • Instruction Fuzzy Hash: B9113671240B059FE330CF15C888B62B7EAFF55760F11C92EE5AA86A90D7B0E945CF60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 655c4edcc936791763e04923be4c22679df8ae5058c891d1c595f59b22235dd7
                                                • Instruction ID: d3f1fc1435f1dc92a5231f96274dc20d3127ec328bf7cde40ba5284dfc7ab09b
                                                • Opcode Fuzzy Hash: 655c4edcc936791763e04923be4c22679df8ae5058c891d1c595f59b22235dd7
                                                • Instruction Fuzzy Hash: B001D6722447056ED7305F68CC02F77FB98AB847A0F10862AF65ACA2D1EA31E4008790
                                                APIs
                                                • __lock_file.LIBCMT ref: 009F4AD6
                                                  • Part of subcall function 009F8D68: __getptd_noexit.LIBCMT ref: 009F8D68
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __getptd_noexit__lock_file
                                                • String ID:
                                                • API String ID: 2597487223-0
                                                • Opcode ID: 2c16137f8b5acb53ca5cc626f1a4c01234f9f582627d0f933827b863b37390e0
                                                • Instruction ID: 687c39c7ef74e8744d4cfb5b00f03e966e7caa9ea301c2653395099e2045a9b5
                                                • Opcode Fuzzy Hash: 2c16137f8b5acb53ca5cc626f1a4c01234f9f582627d0f933827b863b37390e0
                                                • Instruction Fuzzy Hash: A8F0C83194020DABDF91BF74CC063BF3669AF40325F144514F6249A1D1DB78C951DF51
                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,00A962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009D4FDE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: ad29b69f82c476e00413ae98c906f1c031a49392a082d0f15177504800b3813c
                                                • Instruction ID: 218e644feb09408d614db3a17aa72b0b526025f5096efd1882269c79c13798b5
                                                • Opcode Fuzzy Hash: ad29b69f82c476e00413ae98c906f1c031a49392a082d0f15177504800b3813c
                                                • Instruction Fuzzy Hash: 5CF03971585B12CFCB349F68E894822BBE5BF04329320CA3FE2D682720C731A840DF40
                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 009F09F4
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LongNamePath_memmove
                                                • String ID:
                                                • API String ID: 2514874351-0
                                                • Opcode ID: b62625d03715785734d10c87af1fc32b8b883b63d65a924fa2cb8bebdf1ade5d
                                                • Instruction ID: 8f55f859ea519ea01f0e47149a010872646b8965cca28674b003508ae6e354ed
                                                • Opcode Fuzzy Hash: b62625d03715785734d10c87af1fc32b8b883b63d65a924fa2cb8bebdf1ade5d
                                                • Instruction Fuzzy Hash: 6DE086769442285BC720E6989C05FFAB7EDDF89791F0441B6FC0CD7244E9609C818690
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                • Instruction ID: d61346a48863289f5b914de522ae7f5884e245dc24e0acb184a8b830e9845b08
                                                • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                • Instruction Fuzzy Hash: 45E09AB0204B009FEB788B24D850BE373E0AB06315F00091CF2AAD3342EBA2B8418B59
                                                APIs
                                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00A0E16B,?,?,00000000), ref: 009D5DBF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 1be289efe61f52361fa05d6da1a89a1cf00fff674a3e1eddfba30b284e1fb7f1
                                                • Instruction ID: 6ecb14ced48443fb91fa1c642866292afcb6e2825cb10e1e5d6f979a7f863f4b
                                                • Opcode Fuzzy Hash: 1be289efe61f52361fa05d6da1a89a1cf00fff674a3e1eddfba30b284e1fb7f1
                                                • Instruction Fuzzy Hash: 88D0C77464030CBFE710DB80DC46FAA777CE705711F100294FE0497290D6B27D508795
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __wfsopen
                                                • String ID:
                                                • API String ID: 197181222-0
                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                • Instruction ID: ea2a2455133626b08a7ffec3992a0676af14a8e503997b0cc522bfbf11bb1043
                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                • Instruction Fuzzy Hash: D5B0927684020C77DE012E82EC02B693F199B80678F808020FB0C18172A673A6A09689
                                                APIs
                                                • GetLastError.KERNEL32(00000002,00000000), ref: 00A3D46A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID:
                                                • API String ID: 1452528299-0
                                                • Opcode ID: da42d4f24f1d1dca5b24f6ae0b1c968638d3ca8e1d05c46bce1b4616f47d4ab8
                                                • Instruction ID: 5efaa2967c1d0f83217dd6282f7708a9fa407a9b263f5d181fda4105e3b0873a
                                                • Opcode Fuzzy Hash: da42d4f24f1d1dca5b24f6ae0b1c968638d3ca8e1d05c46bce1b4616f47d4ab8
                                                • Instruction Fuzzy Hash: 94717231248702DFC714EF28D591B6AB7E0AF88314F04496DF4969B3A2DB30ED09CB52
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: d8b9aab6af00deb11d8867548d5ce4adc652601e3a17c1df37d7bd6e71195617
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: 8131C571A00109DFC718DF58D480979F7AAFF99311B648AA5E50ACB652D731EDD1CBC0
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 009922B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction ID: 3cff0f71c40d47f420b414e03a454bf4539015aeb42110f194a264f1715453ef
                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction Fuzzy Hash: 87E0BF7494010EEFDB00EFA8D5496DE7BB4EF04311F1005A1FD05D7680DB319E548A62
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 009922B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648801357.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_990000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 68dd16e31609cb80522dd68b93ffbc28323239cc5615cfb478154d6a37f34eb9
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: CBE0E67494010EEFDB00EFB8D54969E7FB4EF04301F1001A1FD01D2280D6319D508A72
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A5CE50
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A5CE91
                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A5CED6
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A5CF00
                                                • SendMessageW.USER32 ref: 00A5CF29
                                                • _wcsncpy.LIBCMT ref: 00A5CFA1
                                                • GetKeyState.USER32(00000011), ref: 00A5CFC2
                                                • GetKeyState.USER32(00000009), ref: 00A5CFCF
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A5CFE5
                                                • GetKeyState.USER32(00000010), ref: 00A5CFEF
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A5D018
                                                • SendMessageW.USER32 ref: 00A5D03F
                                                • SendMessageW.USER32(?,00001030,?,00A5B602), ref: 00A5D145
                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A5D15B
                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A5D16E
                                                • SetCapture.USER32(?), ref: 00A5D177
                                                • ClientToScreen.USER32(?,?), ref: 00A5D1DC
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A5D1E9
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A5D203
                                                • ReleaseCapture.USER32 ref: 00A5D20E
                                                • GetCursorPos.USER32(?), ref: 00A5D248
                                                • ScreenToClient.USER32(?,?), ref: 00A5D255
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A5D2B1
                                                • SendMessageW.USER32 ref: 00A5D2DF
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A5D31C
                                                • SendMessageW.USER32 ref: 00A5D34B
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A5D36C
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A5D37B
                                                • GetCursorPos.USER32(?), ref: 00A5D39B
                                                • ScreenToClient.USER32(?,?), ref: 00A5D3A8
                                                • GetParent.USER32(?), ref: 00A5D3C8
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A5D431
                                                • SendMessageW.USER32 ref: 00A5D462
                                                • ClientToScreen.USER32(?,?), ref: 00A5D4C0
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A5D4F0
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A5D51A
                                                • SendMessageW.USER32 ref: 00A5D53D
                                                • ClientToScreen.USER32(?,?), ref: 00A5D58F
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A5D5C3
                                                  • Part of subcall function 009D25DB: GetWindowLongW.USER32(?,000000EB), ref: 009D25EC
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A5D65F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                • String ID: @GUI_DRAGID$F
                                                • API String ID: 3977979337-4164748364
                                                • Opcode ID: d6a7f7fd94d0b72393e9ce85ad44d5b297974371a04ac5c404b77e8635e3c1bb
                                                • Instruction ID: 7dbc89798fd11955e48714d933ca278b7095b36f32a3e03391a1f7e39428e0e9
                                                • Opcode Fuzzy Hash: d6a7f7fd94d0b72393e9ce85ad44d5b297974371a04ac5c404b77e8635e3c1bb
                                                • Instruction Fuzzy Hash: 2242AC70204341AFDB25CF68C884FAABBF5FF48366F14451DFA95972A0D731A849CB92
                                                APIs
                                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00A5873F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 3850602802-328681919
                                                • Opcode ID: f849253306fdb1978dfef06fb79d493c78712f4382bf0edd1248c57274b09f84
                                                • Instruction ID: 9bab30ac4376d9206f4b6a2b751575fd1bca1b5c1fb4d7eecd58c46a2c179685
                                                • Opcode Fuzzy Hash: f849253306fdb1978dfef06fb79d493c78712f4382bf0edd1248c57274b09f84
                                                • Instruction Fuzzy Hash: C612AF71500248AFEB259F64CC49FAB7BB8FF89712F204169F915EA2A1DF788945CB10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove$_memset
                                                • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                • API String ID: 1357608183-1798697756
                                                • Opcode ID: ac33bf5d41a7e8ca6a1a0730dd03d01b0a4192a6a8ff227b0667c48487442ca8
                                                • Instruction ID: df0c2af06c90d9c5ee0a2ed09dea9c2f63ba225bf1ad4c6ed03eeeecf5f7676d
                                                • Opcode Fuzzy Hash: ac33bf5d41a7e8ca6a1a0730dd03d01b0a4192a6a8ff227b0667c48487442ca8
                                                • Instruction Fuzzy Hash: 6093B071A00229DFDF25CF9DD881BADB7B1FF48710F25856AE945AB280E7749E81CB40
                                                APIs
                                                • GetForegroundWindow.USER32(00000000,?), ref: 009D4A3D
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A0DA8E
                                                • IsIconic.USER32(?), ref: 00A0DA97
                                                • ShowWindow.USER32(?,00000009), ref: 00A0DAA4
                                                • SetForegroundWindow.USER32(?), ref: 00A0DAAE
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A0DAC4
                                                • GetCurrentThreadId.KERNEL32 ref: 00A0DACB
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A0DAD7
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A0DAE8
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A0DAF0
                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00A0DAF8
                                                • SetForegroundWindow.USER32(?), ref: 00A0DAFB
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A0DB10
                                                • keybd_event.USER32(00000012,00000000), ref: 00A0DB1B
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A0DB25
                                                • keybd_event.USER32(00000012,00000000), ref: 00A0DB2A
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A0DB33
                                                • keybd_event.USER32(00000012,00000000), ref: 00A0DB38
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A0DB42
                                                • keybd_event.USER32(00000012,00000000), ref: 00A0DB47
                                                • SetForegroundWindow.USER32(?), ref: 00A0DB4A
                                                • AttachThreadInput.USER32(?,?,00000000), ref: 00A0DB71
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: e1160130b59bf8dc816ac39a0dd6e8d0ba36d5f51d108092cff108b2d9bb6144
                                                • Instruction ID: ce8686ec677f643e682648accde5cc963dc4485ffd34808e715363a0a5b071a7
                                                • Opcode Fuzzy Hash: e1160130b59bf8dc816ac39a0dd6e8d0ba36d5f51d108092cff108b2d9bb6144
                                                • Instruction Fuzzy Hash: 8C312F72A80318BFEB21AFE19C49F7F7E6CEB44B51F114065FA05EB1D1D6B05901AAA0
                                                APIs
                                                  • Part of subcall function 00A28CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A28D0D
                                                  • Part of subcall function 00A28CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A28D3A
                                                  • Part of subcall function 00A28CC3: GetLastError.KERNEL32 ref: 00A28D47
                                                • _memset.LIBCMT ref: 00A2889B
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A288ED
                                                • CloseHandle.KERNEL32(?), ref: 00A288FE
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A28915
                                                • GetProcessWindowStation.USER32 ref: 00A2892E
                                                • SetProcessWindowStation.USER32(00000000), ref: 00A28938
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A28952
                                                  • Part of subcall function 00A28713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A28851), ref: 00A28728
                                                  • Part of subcall function 00A28713: CloseHandle.KERNEL32(?,?,00A28851), ref: 00A2873A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                • String ID: $default$winsta0
                                                • API String ID: 2063423040-1027155976
                                                • Opcode ID: 6bba71c79e64907c5f67eec19e4a021e46340b7cc10243307ae20ff27010ea7c
                                                • Instruction ID: 3b63ff1543289a9af309237895e91081d0d60897a40c6def53137b8e198bb41d
                                                • Opcode Fuzzy Hash: 6bba71c79e64907c5f67eec19e4a021e46340b7cc10243307ae20ff27010ea7c
                                                • Instruction Fuzzy Hash: 27817A71802219AFDF11DFA8ED45AEEBBB8FF04345F08412AF910A6161DF398E15DB60
                                                APIs
                                                • OpenClipboard.USER32(00A5F910), ref: 00A44284
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A44292
                                                • GetClipboardData.USER32(0000000D), ref: 00A4429A
                                                • CloseClipboard.USER32 ref: 00A442A6
                                                • GlobalLock.KERNEL32(00000000), ref: 00A442C2
                                                • CloseClipboard.USER32 ref: 00A442CC
                                                • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00A442E1
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00A442EE
                                                • GetClipboardData.USER32(00000001), ref: 00A442F6
                                                • GlobalLock.KERNEL32(00000000), ref: 00A44303
                                                • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00A44337
                                                • CloseClipboard.USER32 ref: 00A44447
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                • String ID:
                                                • API String ID: 3222323430-0
                                                • Opcode ID: 8e29d11826777052c522457f42604181ae51694649ec9b5840aa7110918dffb3
                                                • Instruction ID: da53f1ea444e7469f9fb437e01f254b5bfcab74da833a964cb457c3b0d564885
                                                • Opcode Fuzzy Hash: 8e29d11826777052c522457f42604181ae51694649ec9b5840aa7110918dffb3
                                                • Instruction Fuzzy Hash: 22518F75244302AFD301EFA4EC86FBE77A8BFC8B01F10452AF556D62A1DB70D9058B62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A3C9F8
                                                • FindClose.KERNEL32(00000000), ref: 00A3CA4C
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A3CA71
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A3CA88
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A3CAAF
                                                • __swprintf.LIBCMT ref: 00A3CAFB
                                                • __swprintf.LIBCMT ref: 00A3CB3E
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                • __swprintf.LIBCMT ref: 00A3CB92
                                                  • Part of subcall function 009F38D8: __woutput_l.LIBCMT ref: 009F3931
                                                • __swprintf.LIBCMT ref: 00A3CBE0
                                                  • Part of subcall function 009F38D8: __flsbuf.LIBCMT ref: 009F3953
                                                  • Part of subcall function 009F38D8: __flsbuf.LIBCMT ref: 009F396B
                                                • __swprintf.LIBCMT ref: 00A3CC2F
                                                • __swprintf.LIBCMT ref: 00A3CC7E
                                                • __swprintf.LIBCMT ref: 00A3CCCD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                • API String ID: 3953360268-2428617273
                                                • Opcode ID: 8443b32040185182cbdbc81437a54000636c11a563bb14b783816bdbddb6d419
                                                • Instruction ID: c95711488aea5561a643e461dc2b4e8c224ff7707c03b3a23d1280cb4dbc214b
                                                • Opcode Fuzzy Hash: 8443b32040185182cbdbc81437a54000636c11a563bb14b783816bdbddb6d419
                                                • Instruction Fuzzy Hash: 65A12FB2548305ABC710FBA4CD85EAFB7ECBF94704F40891AB585D7291EA34DA08C762
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A3F221
                                                • _wcscmp.LIBCMT ref: 00A3F236
                                                • _wcscmp.LIBCMT ref: 00A3F24D
                                                • GetFileAttributesW.KERNEL32(?), ref: 00A3F25F
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00A3F279
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00A3F291
                                                • FindClose.KERNEL32(00000000), ref: 00A3F29C
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00A3F2B8
                                                • _wcscmp.LIBCMT ref: 00A3F2DF
                                                • _wcscmp.LIBCMT ref: 00A3F2F6
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3F308
                                                • SetCurrentDirectoryW.KERNEL32(00A8A5A0), ref: 00A3F326
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3F330
                                                • FindClose.KERNEL32(00000000), ref: 00A3F33D
                                                • FindClose.KERNEL32(00000000), ref: 00A3F34F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1803514871-438819550
                                                • Opcode ID: 60bb50573df7f8393dcd99e694cfac2dd51e31feaa14aa3f1bfe09205b323a7e
                                                • Instruction ID: 717a7ea6a2b62613741849121c1cab061a88043d1fd7c25e254c85975afcc582
                                                • Opcode Fuzzy Hash: 60bb50573df7f8393dcd99e694cfac2dd51e31feaa14aa3f1bfe09205b323a7e
                                                • Instruction Fuzzy Hash: 7A31A376901219BEDB10EBF4EC49AEE73ACAF48361F144576F924D70A0EB34DA45CB50
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50BDE
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A5F910,00000000,?,00000000,?,?), ref: 00A50C4C
                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A50C94
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A50D1D
                                                • RegCloseKey.ADVAPI32(?), ref: 00A5103D
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A5104A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Close$ConnectCreateRegistryValue
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 536824911-966354055
                                                • Opcode ID: 9f8c6797aaeb9ce39c11ef567b52f746cc569b61703d7f8e577c3aadb40281d3
                                                • Instruction ID: d09c5fe46039e18038b857753132d70c4d460411d17bcd738198edd8cd2da564
                                                • Opcode Fuzzy Hash: 9f8c6797aaeb9ce39c11ef567b52f746cc569b61703d7f8e577c3aadb40281d3
                                                • Instruction Fuzzy Hash: BB0229752046119FCB14EF18C895F2AB7E5BF88714F04885DF88A9B3A2DB34ED45CB81
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A3F37E
                                                • _wcscmp.LIBCMT ref: 00A3F393
                                                • _wcscmp.LIBCMT ref: 00A3F3AA
                                                  • Part of subcall function 00A345C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A345DC
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00A3F3D9
                                                • FindClose.KERNEL32(00000000), ref: 00A3F3E4
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00A3F400
                                                • _wcscmp.LIBCMT ref: 00A3F427
                                                • _wcscmp.LIBCMT ref: 00A3F43E
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3F450
                                                • SetCurrentDirectoryW.KERNEL32(00A8A5A0), ref: 00A3F46E
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3F478
                                                • FindClose.KERNEL32(00000000), ref: 00A3F485
                                                • FindClose.KERNEL32(00000000), ref: 00A3F497
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 1824444939-438819550
                                                • Opcode ID: 88bdd3c16bbda713125ba2177476f14a804b3617602375914e70492a14ce89c8
                                                • Instruction ID: 45dcaedfdd55a1605cccfa9b62c268b9d9d0b69282bc60b495918c818c92588f
                                                • Opcode Fuzzy Hash: 88bdd3c16bbda713125ba2177476f14a804b3617602375914e70492a14ce89c8
                                                • Instruction Fuzzy Hash: EF31D5729012197EDF10EBA4EC88AEF77ACAF49321F104275F920A30A0D734DE85CB50
                                                APIs
                                                  • Part of subcall function 00A2874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28766
                                                  • Part of subcall function 00A2874A: GetLastError.KERNEL32(?,00A2822A,?,?,?), ref: 00A28770
                                                  • Part of subcall function 00A2874A: GetProcessHeap.KERNEL32(00000008,?,?,00A2822A,?,?,?), ref: 00A2877F
                                                  • Part of subcall function 00A2874A: HeapAlloc.KERNEL32(00000000,?,00A2822A,?,?,?), ref: 00A28786
                                                  • Part of subcall function 00A2874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A2879D
                                                  • Part of subcall function 00A287E7: GetProcessHeap.KERNEL32(00000008,00A28240,00000000,00000000,?,00A28240,?), ref: 00A287F3
                                                  • Part of subcall function 00A287E7: HeapAlloc.KERNEL32(00000000,?,00A28240,?), ref: 00A287FA
                                                  • Part of subcall function 00A287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A28240,?), ref: 00A2880B
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A2825B
                                                • _memset.LIBCMT ref: 00A28270
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A2828F
                                                • GetLengthSid.ADVAPI32(?), ref: 00A282A0
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00A282DD
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A282F9
                                                • GetLengthSid.ADVAPI32(?), ref: 00A28316
                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A28325
                                                • HeapAlloc.KERNEL32(00000000), ref: 00A2832C
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A2834D
                                                • CopySid.ADVAPI32(00000000), ref: 00A28354
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A28385
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A283AB
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A283BF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                • String ID:
                                                • API String ID: 3996160137-0
                                                • Opcode ID: 2b47be9a7ca0501074fb47d08ade587009429acd2d0b122741798aa0ee4ea37d
                                                • Instruction ID: 22ad71afc18db2924cfa696fb065206ca2c1577ecfc285b33021779c813d1eba
                                                • Opcode Fuzzy Hash: 2b47be9a7ca0501074fb47d08ade587009429acd2d0b122741798aa0ee4ea37d
                                                • Instruction Fuzzy Hash: FD616E71901219EFDF00DFA8ED44AEEBBB9FF04701F188129F915AB291DB359A05DB60
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                • API String ID: 0-4052911093
                                                • Opcode ID: e3547d8b2ce0b7405878335bc2994bdae35c00045f19bc8f7971cc547c3e1eef
                                                • Instruction ID: 6ad22dc3773b630c6aef2fc26531726fa7fd03c54294f430173d4bd87c8c2dc0
                                                • Opcode Fuzzy Hash: e3547d8b2ce0b7405878335bc2994bdae35c00045f19bc8f7971cc547c3e1eef
                                                • Instruction Fuzzy Hash: 1872A371E00269DBDF25CF59D8807AEB7B5FF68350F14816AE949EB280E7349D81CB90
                                                APIs
                                                  • Part of subcall function 00A510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A50038,?,?), ref: 00A510BC
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50737
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A507D6
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A5086E
                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A50AAD
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A50ABA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                • String ID:
                                                • API String ID: 1240663315-0
                                                • Opcode ID: 212047c8da9d93df9eef24093a0766f436fe25171aedd6613b9e8567f88108e5
                                                • Instruction ID: e0b84aa46926b9f57926a2f3daee88e064f73af82f91ce2f895757df5b0c2fc3
                                                • Opcode Fuzzy Hash: 212047c8da9d93df9eef24093a0766f436fe25171aedd6613b9e8567f88108e5
                                                • Instruction Fuzzy Hash: C2E14C71204710AFCB14DF29C895E2ABBF4FF89714B04896DF94ADB2A2DA30ED05CB51
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00A30241
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00A302C2
                                                • GetKeyState.USER32(000000A0), ref: 00A302DD
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00A302F7
                                                • GetKeyState.USER32(000000A1), ref: 00A3030C
                                                • GetAsyncKeyState.USER32(00000011), ref: 00A30324
                                                • GetKeyState.USER32(00000011), ref: 00A30336
                                                • GetAsyncKeyState.USER32(00000012), ref: 00A3034E
                                                • GetKeyState.USER32(00000012), ref: 00A30360
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00A30378
                                                • GetKeyState.USER32(0000005B), ref: 00A3038A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: b36526ff0a84389bdf20c30bc4560882b78defd0b08a87dcc8d8cab21729f83c
                                                • Instruction ID: 1a8a0f775c9248efe8e1ce63fc0b5e2ca484738a40ae07842e44b49ac3afd5ca
                                                • Opcode Fuzzy Hash: b36526ff0a84389bdf20c30bc4560882b78defd0b08a87dcc8d8cab21729f83c
                                                • Instruction Fuzzy Hash: 314189645047C96EFF719BE48828BE6BEA07F11344F08409DE6C64B1C2E7E459C4C7A2
                                                APIs
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • CoInitialize.OLE32 ref: 00A48718
                                                • CoUninitialize.OLE32 ref: 00A48723
                                                • CoCreateInstance.OLE32(?,00000000,00000017,00A62BEC,?), ref: 00A48783
                                                • IIDFromString.OLE32(?,?), ref: 00A487F6
                                                • VariantInit.OLEAUT32(?), ref: 00A48890
                                                • VariantClear.OLEAUT32(?), ref: 00A488F1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 834269672-1287834457
                                                • Opcode ID: 369816c0f944b2cdd360644e4284c1e19ab448a312ae5c671e45434afbc4e1ec
                                                • Instruction ID: e0ac7813ffb0e756b0d4af7c77cfcb8978c09ef6703170c43c906a2430382738
                                                • Opcode Fuzzy Hash: 369816c0f944b2cdd360644e4284c1e19ab448a312ae5c671e45434afbc4e1ec
                                                • Instruction Fuzzy Hash: 3161B074608301AFD710EF64D988B6FBBE8AF88754F10481DF9859B291CB74ED44CB92
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 2170b9a243021bed006c56c451b1e5dcde457fbd3a0b1445cfa3a9993edf9f2d
                                                • Instruction ID: 25cef0f2fac034b27b7ba955e8ba233122f91084e35e1cbaf8cf30f433489b9c
                                                • Opcode Fuzzy Hash: 2170b9a243021bed006c56c451b1e5dcde457fbd3a0b1445cfa3a9993edf9f2d
                                                • Instruction Fuzzy Hash: B62153393012209FDB10EFA4EC49B6E77A8FF88711F108026F946DB2A1DB74AD01CB55
                                                APIs
                                                  • Part of subcall function 009D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D48A1,?,?,009D37C0,?), ref: 009D48CE
                                                  • Part of subcall function 00A34CD3: GetFileAttributesW.KERNEL32(?,00A33947), ref: 00A34CD4
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A33ADF
                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00A33B87
                                                • MoveFileW.KERNEL32(?,?), ref: 00A33B9A
                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00A33BB7
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A33BD9
                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00A33BF5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 4002782344-1173974218
                                                • Opcode ID: f66706b1683ea351fc45b61fa1c01cb6a94d8bd108d43cb6493df0b8808c8932
                                                • Instruction ID: aa520eb8b0dabdf84a488770f6ed47b728a7081a97a9df3e204b6afefb14d67e
                                                • Opcode Fuzzy Hash: f66706b1683ea351fc45b61fa1c01cb6a94d8bd108d43cb6493df0b8808c8932
                                                • Instruction Fuzzy Hash: 815140328492599ACF15EBE0CE92AEDF779AF54300F64816AF44277191EF316F09CB60
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00A3F6AB
                                                • Sleep.KERNEL32(0000000A), ref: 00A3F6DB
                                                • _wcscmp.LIBCMT ref: 00A3F6EF
                                                • _wcscmp.LIBCMT ref: 00A3F70A
                                                • FindNextFileW.KERNEL32(?,?), ref: 00A3F7A8
                                                • FindClose.KERNEL32(00000000), ref: 00A3F7BE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                • String ID: *.*
                                                • API String ID: 713712311-438819550
                                                • Opcode ID: f66fec4ab64ad7abf9290cab1ba59be7a6bd93819e46879f17f44f6d0ef45ac9
                                                • Instruction ID: c5ecd3fe5178d4ea07ff4e15d765c45b56ea807f37f20cee9ffa2f8fa478f2ca
                                                • Opcode Fuzzy Hash: f66fec4ab64ad7abf9290cab1ba59be7a6bd93819e46879f17f44f6d0ef45ac9
                                                • Instruction Fuzzy Hash: 7D414C7195021AAFDF15EFA4CC85AEEBBB4BF45310F144566F815A22A1EB309E44CBA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 5aa0307edf0a5a0b21df7993c9e6f8879cdaf1ce8dc04b930ea7cd46dc5ec724
                                                • Instruction ID: 984149c56f7682d6086ebf2ce121fb2271950506f5c9824bf9769fb91e6a53cb
                                                • Opcode Fuzzy Hash: 5aa0307edf0a5a0b21df7993c9e6f8879cdaf1ce8dc04b930ea7cd46dc5ec724
                                                • Instruction Fuzzy Hash: 0BA27D74E0425ACBDF25CF59C9807EEB7B1BB54314F2485AAD856A7280E7349EC1CF80
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: c324ca1fd83252f4d4ca4054613e26cd20bdf240f8666e58aa76a578dbddc663
                                                • Instruction ID: 38e1b07c4a2c9b71769a42a79d4ddfce1800ca14f2ff3464445c1af0d335d886
                                                • Opcode Fuzzy Hash: c324ca1fd83252f4d4ca4054613e26cd20bdf240f8666e58aa76a578dbddc663
                                                • Instruction Fuzzy Hash: 39129B70A00619EFDF14DFA9D981AAEB7F5FF88304F148529E406E7292EB35AD11CB50
                                                APIs
                                                  • Part of subcall function 00A28CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A28D0D
                                                  • Part of subcall function 00A28CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A28D3A
                                                  • Part of subcall function 00A28CC3: GetLastError.KERNEL32 ref: 00A28D47
                                                • ExitWindowsEx.USER32(?,00000000), ref: 00A3549B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-194228
                                                • Opcode ID: 6ecb4317f6a8b643910a49015b18f21a8bdef1a298bd8e9e12cba08f8b917caf
                                                • Instruction ID: 83cde1818a43cdd658167b9ff6e95a83551efa025a4293608eacc4e45bd0fbcc
                                                • Opcode Fuzzy Hash: 6ecb4317f6a8b643910a49015b18f21a8bdef1a298bd8e9e12cba08f8b917caf
                                                • Instruction Fuzzy Hash: 8501F771E55B116EE72CA77CEC4ABBA7269EB05353F240531FD07D60D3EAA45C808590
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A465EF
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A465FE
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00A4661A
                                                • listen.WSOCK32(00000000,00000005), ref: 00A46629
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A46643
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00A46657
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                • String ID:
                                                • API String ID: 1279440585-0
                                                • Opcode ID: 5400d64ff07e25d059c45ab1991d9f3ff8b2e66d41fbbd3df49a4f599a41ff98
                                                • Instruction ID: d6d91340bfab92a31f6ddfe8d5ea20f7089edda8786b147f32851fafe983597e
                                                • Opcode Fuzzy Hash: 5400d64ff07e25d059c45ab1991d9f3ff8b2e66d41fbbd3df49a4f599a41ff98
                                                • Instruction Fuzzy Hash: E121D035200210AFCB04FF68D945B6EB7B9EF89321F11816AF956A73D1CB70AD01CB51
                                                APIs
                                                  • Part of subcall function 009F0FF6: std::exception::exception.LIBCMT ref: 009F102C
                                                  • Part of subcall function 009F0FF6: __CxxThrowException@8.LIBCMT ref: 009F1041
                                                • _memmove.LIBCMT ref: 00A2062F
                                                • _memmove.LIBCMT ref: 00A20744
                                                • _memmove.LIBCMT ref: 00A207EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                • String ID:
                                                • API String ID: 1300846289-0
                                                • Opcode ID: 3ec5515d78016c9ef819ff7fe6b5c945a1124aa1d1558f46849f446bde0e6afe
                                                • Instruction ID: a849bd1e7a8f3a8e83b2eeac0fe5cfcdcb7834eacef99642a459e1ddeae8820f
                                                • Opcode Fuzzy Hash: 3ec5515d78016c9ef819ff7fe6b5c945a1124aa1d1558f46849f446bde0e6afe
                                                • Instruction Fuzzy Hash: F1029FB0A00219DFDF04DF69E981AAEBBB5FF84300F158069E806DB256EB35DD51CB91
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 009D19FA
                                                • GetSysColor.USER32(0000000F), ref: 009D1A4E
                                                • SetBkColor.GDI32(?,00000000), ref: 009D1A61
                                                  • Part of subcall function 009D1290: DefDlgProcW.USER32(?,00000020,?), ref: 009D12D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ColorProc$LongWindow
                                                • String ID:
                                                • API String ID: 3744519093-0
                                                • Opcode ID: 0a6d559bfe1c0f9fe1a9e1484c0ddd43fc74addef6d3a22872b77af9e6a12d2a
                                                • Instruction ID: d87d2de8776c047184a2f590f279c375105b4ece749e5c57349857f359417b96
                                                • Opcode Fuzzy Hash: 0a6d559bfe1c0f9fe1a9e1484c0ddd43fc74addef6d3a22872b77af9e6a12d2a
                                                • Instruction Fuzzy Hash: 1AA16A73295548BEE628AB686E54E7F359CEF46342F14851BF402D63E9CE28CD01D2B1
                                                APIs
                                                  • Part of subcall function 00A480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A480CB
                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A46AB1
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A46ADA
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00A46B13
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A46B20
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00A46B34
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 99427753-0
                                                • Opcode ID: 3be9ec4b529930abc45e4ba08adaa4720bd1de4f3f177a182946fa5c4c8f97d5
                                                • Instruction ID: 24a5e82cd8e112ad455b9713b60725b08b7f8d10eeca8b943a773fcb8b8dfa3a
                                                • Opcode Fuzzy Hash: 3be9ec4b529930abc45e4ba08adaa4720bd1de4f3f177a182946fa5c4c8f97d5
                                                • Instruction Fuzzy Hash: 3141A575640210AFEB10BF68DC86F6E77A9EB85710F04C059F95AAB3D2DA705D018B91
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: b55dcbb2129108f8d593021a205837bcb4fd9ec26e5bae700934e29a9f6fd23c
                                                • Instruction ID: f6c1954e382d127516e373c1198442918081c0d4410ec476e37ec0c22a7ba016
                                                • Opcode Fuzzy Hash: b55dcbb2129108f8d593021a205837bcb4fd9ec26e5bae700934e29a9f6fd23c
                                                • Instruction Fuzzy Hash: FD11C831B406506FD7116F76DC64B2FB7A9FF94722B894029FC06D7641DB3099028A95
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00A11D88,?), ref: 00A4C312
                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A4C324
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                • API String ID: 2574300362-1816364905
                                                • Opcode ID: 8fd567a2e97481c090d8595b74f5bd3216b35d870144b56d0154ae7399a99226
                                                • Instruction ID: bfabc55205586fb660e6d88f725eb51706dd9f032eb4d73636d2a6fa53505063
                                                • Opcode Fuzzy Hash: 8fd567a2e97481c090d8595b74f5bd3216b35d870144b56d0154ae7399a99226
                                                • Instruction Fuzzy Hash: 22E01278611713DFDB609F65D804A46B6E4FF48766F80C839E999DA2A0E770F841CB60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __itow__swprintf
                                                • String ID:
                                                • API String ID: 674341424-0
                                                • Opcode ID: 08c309265f9d2b7879836a9257b4b2d0e1e1b184513f5bdfea0615fbb47a3594
                                                • Instruction ID: 09c70ac01123c9d6269b6bcce330154fbb1917bc335a23a308885161f262ee5d
                                                • Opcode Fuzzy Hash: 08c309265f9d2b7879836a9257b4b2d0e1e1b184513f5bdfea0615fbb47a3594
                                                • Instruction Fuzzy Hash: 282289716083419FC725EF25C885BAEB7E4AF84704F10892DF99A97391DB70EE44CB92
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00A4F151
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00A4F15F
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                • Process32NextW.KERNEL32(00000000,?), ref: 00A4F21F
                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00A4F22E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                • String ID:
                                                • API String ID: 2576544623-0
                                                • Opcode ID: 2d533fb0c63649ca4a532ee2cf633b3142685e4f5718fa1d279359bb605fba4b
                                                • Instruction ID: 6eff1cd6359546cdf437c52688309ae3324fa38e08f78bf1d331788c48d2e48f
                                                • Opcode Fuzzy Hash: 2d533fb0c63649ca4a532ee2cf633b3142685e4f5718fa1d279359bb605fba4b
                                                • Instruction Fuzzy Hash: 59515B71504711AFD310EF24DC85B6BB7E8BFD4750F10892EF596972A2EB70A904CB92
                                                APIs
                                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00A340D1
                                                • _memset.LIBCMT ref: 00A340F2
                                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00A34144
                                                • CloseHandle.KERNEL32(00000000), ref: 00A3414D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                                • String ID:
                                                • API String ID: 1157408455-0
                                                • Opcode ID: ea7392a02608edc827428c1594d8ac080fce7adb6413b2d6068cb038cc7298ed
                                                • Instruction ID: 85c0257fdc402732c3573c715070932c52ee160a0dcfb7bbc1bcef285fce5057
                                                • Opcode Fuzzy Hash: ea7392a02608edc827428c1594d8ac080fce7adb6413b2d6068cb038cc7298ed
                                                • Instruction Fuzzy Hash: CE11A7759013287AE7309BA5AC4DFABBB7CEF45760F1042AAF908D7190D6745E808BA4
                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A2EB19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($|
                                                • API String ID: 1659193697-1631851259
                                                • Opcode ID: c106988abf878dd64f79deff80b70af8d7a281c43709addda5ee70a8b4ffaf2b
                                                • Instruction ID: 3c130a1e7dbe191d2a88f5cb85c28385cd225ae2ad020685c0074472092ade4b
                                                • Opcode Fuzzy Hash: c106988abf878dd64f79deff80b70af8d7a281c43709addda5ee70a8b4ffaf2b
                                                • Instruction Fuzzy Hash: 41323575A047159FCB28CF19D481A6AB7F0FF48320B15C56EE89ADB3A1E770E981CB40
                                                APIs
                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00A426D5
                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00A4270C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Internet$AvailableDataFileQueryRead
                                                • String ID:
                                                • API String ID: 599397726-0
                                                • Opcode ID: a9d22b67128ad3561234b3aeb5d3c0ed8378ba2ee767370f7f82503335a55641
                                                • Instruction ID: cdc488e75fac4d5b53da36b05bc2424d9b094f53c2ba6870ccf6f55c38a0a776
                                                • Opcode Fuzzy Hash: a9d22b67128ad3561234b3aeb5d3c0ed8378ba2ee767370f7f82503335a55641
                                                • Instruction Fuzzy Hash: 1F41E479900309BFEB20DF94DC85FBBB7BCEBC0764F50406AFA01A6141EA71AE419764
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00A3B5AE
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A3B608
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00A3B655
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: bf7dbe86c95687e3d31150d71e87d21b699e04aa6e10e89afff3e51096fc35eb
                                                • Instruction ID: 642b1cca3a44f047dbbf77ba5004820ee1c05c5f4c73b969fb901cec2f9359a7
                                                • Opcode Fuzzy Hash: bf7dbe86c95687e3d31150d71e87d21b699e04aa6e10e89afff3e51096fc35eb
                                                • Instruction Fuzzy Hash: C0217435A10618EFCB00EF95D881EEDBBB8FF48310F1480AAF945AB351DB319916CB51
                                                APIs
                                                  • Part of subcall function 009F0FF6: std::exception::exception.LIBCMT ref: 009F102C
                                                  • Part of subcall function 009F0FF6: __CxxThrowException@8.LIBCMT ref: 009F1041
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A28D0D
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A28D3A
                                                • GetLastError.KERNEL32 ref: 00A28D47
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                • String ID:
                                                • API String ID: 1922334811-0
                                                • Opcode ID: 8333694e9ba4f4cf1593b5f0326bc3ca776ee1e58af4ff604c0f82408c058e0e
                                                • Instruction ID: e529d6618402254fb2dfdca18de47bfe3d9f0606bce4c8470632f7b8ad2f7497
                                                • Opcode Fuzzy Hash: 8333694e9ba4f4cf1593b5f0326bc3ca776ee1e58af4ff604c0f82408c058e0e
                                                • Instruction Fuzzy Hash: E1118FB1414309AFE728EF58EC85D6BB7BCFB44711B24852EF85697681EB30AC418B60
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00A34C2C
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A34C43
                                                • FreeSid.ADVAPI32(?), ref: 00A34C53
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: 7422159a3b800e865bc4c2ece647fde93e2661c09d33ac1ae201547b5006ec84
                                                • Instruction ID: 1efd5db2cbe964caef7a2a291bd06356ceca642e1a55fb634a1e85ddb9197927
                                                • Opcode Fuzzy Hash: 7422159a3b800e865bc4c2ece647fde93e2661c09d33ac1ae201547b5006ec84
                                                • Instruction Fuzzy Hash: 56F0F975A5130DBFDF04DFF4DD89AAEBBBCFF08212F5044A9A902E2181E6756A448B50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1fcfe3989913f02df8476dd7b4793c4c2dec1f4600d2c310875e46febfa9d28a
                                                • Instruction ID: 8185b47f70eaa48d9f77ceb9ea97b4495c6b0b9cade6d20f5195fe95f8ceecb1
                                                • Opcode Fuzzy Hash: 1fcfe3989913f02df8476dd7b4793c4c2dec1f4600d2c310875e46febfa9d28a
                                                • Instruction Fuzzy Hash: B122BB75A4421ACFCB24EF58C480ABEB7B4FF48300F14C56AE956AF351E734A985CB91
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A3C966
                                                • FindClose.KERNEL32(00000000), ref: 00A3C996
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: c4df03ddc128b6bb4813a5a841713bb98bacc2751f8ea92fb4a7ef496005817a
                                                • Instruction ID: 3ee924eba372e2c16803e80bead2874671edaea7a5fde190972988bf36afba8f
                                                • Opcode Fuzzy Hash: c4df03ddc128b6bb4813a5a841713bb98bacc2751f8ea92fb4a7ef496005817a
                                                • Instruction Fuzzy Hash: 18115E726106109FD710EF29D845A2AF7E9FF84325F01891EF9A9DB3A1DB34AC01CB81
                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00A4977D,?,00A5FB84,?), ref: 00A3A302
                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00A4977D,?,00A5FB84,?), ref: 00A3A314
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: 6c894ae071227d8e5a8279eed5a29b38a1c20f89d88d864585d8b8dceb48eed4
                                                • Instruction ID: 6d59d20cb3e26eeb842e31f4a806dff83c15391f85159af58d062c4e0d43edb7
                                                • Opcode Fuzzy Hash: 6c894ae071227d8e5a8279eed5a29b38a1c20f89d88d864585d8b8dceb48eed4
                                                • Instruction Fuzzy Hash: 69F0823564532DBBEB20EFA4CC48FEAB76DBF09761F008166B919D7181D6309940CBA1
                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A28851), ref: 00A28728
                                                • CloseHandle.KERNEL32(?,?,00A28851), ref: 00A2873A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: d09773dde81136bac4e1b6d976d9d39f2925b9471aa55710dc8f1c68e5139a08
                                                • Instruction ID: 70289e4f4598c7a0ca79ddcf4f0b12eb84904686fe3025d3a72f0842b56c4180
                                                • Opcode Fuzzy Hash: d09773dde81136bac4e1b6d976d9d39f2925b9471aa55710dc8f1c68e5139a08
                                                • Instruction Fuzzy Hash: 4FE0B676011610EEEB252B64FC09E777BA9FB443657288839B99680470DB72AC91DB50
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,009F8F97,?,?,?,00000001), ref: 009FA39A
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 009FA3A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 447abb14eee555ca2f3a32750b67e4fe63714f9f4f0b4f88d659b2b7a80a8d0b
                                                • Instruction ID: 9b87c22e10355d060773a71d76a5fe7841568c9dfbc28d852048fbe4a89615b8
                                                • Opcode Fuzzy Hash: 447abb14eee555ca2f3a32750b67e4fe63714f9f4f0b4f88d659b2b7a80a8d0b
                                                • Instruction Fuzzy Hash: 8FB09271054308AFEA006FD1ED09B893F68FB44AB3F404020F61D88070CB7254528A91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b8c1732006bdadc0a844d1c3d79f764278818bdeea6cbf1afe80aaf2dcee578e
                                                • Instruction ID: 46d32faaaef7be0b0dac0a2bb533b97a3addcaa7eae54bc26b9d1aa45a6fdbb5
                                                • Opcode Fuzzy Hash: b8c1732006bdadc0a844d1c3d79f764278818bdeea6cbf1afe80aaf2dcee578e
                                                • Instruction Fuzzy Hash: 80321522D79F054DD7239634D832339A25DAFB73D8F15D737E81AB5AA6EB28C4834200
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad508f1aeab22627b9437facd3ae4f7c8b5b67c65fc3ea8ee331a8b8eec673bc
                                                • Instruction ID: 50bffac3e9c8851c96cca7a497799475f18716f8a4744894cf610404b5e1cec7
                                                • Opcode Fuzzy Hash: ad508f1aeab22627b9437facd3ae4f7c8b5b67c65fc3ea8ee331a8b8eec673bc
                                                • Instruction Fuzzy Hash: 52B12320E2AF414DD32396398835336B76CAFBB2C5F51D71BFC2674E62EB6285834641
                                                APIs
                                                • __time64.LIBCMT ref: 00A38B25
                                                  • Part of subcall function 009F543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00A391F8,00000000,?,?,?,?,00A393A9,00000000,?), ref: 009F5443
                                                  • Part of subcall function 009F543A: __aulldiv.LIBCMT ref: 009F5463
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Time$FileSystem__aulldiv__time64
                                                • String ID:
                                                • API String ID: 2893107130-0
                                                • Opcode ID: 227c7c46bc27532a5d956697535b2ae2527a83f1913e75d5765b4601e9b7c3c8
                                                • Instruction ID: e5865f917af33de198a84e124cca1be8a060a7cab92a4feb6eba18c8b8caefa1
                                                • Opcode Fuzzy Hash: 227c7c46bc27532a5d956697535b2ae2527a83f1913e75d5765b4601e9b7c3c8
                                                • Instruction Fuzzy Hash: 2021DF72635610CBC729CF29D841A56B3E1EBA4321F298E6DE1E5CB2D0CE74BD05CB94
                                                APIs
                                                • BlockInput.USER32(00000001), ref: 00A44218
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: f6f0d79520857ebe7085813ba60ebb39f8e82e50fee11b76ea4b4508a54b8478
                                                • Instruction ID: f0b6220835242b05a2b5ac62be3250a3ab8b188f48e8a38499e7968d26b268a6
                                                • Opcode Fuzzy Hash: f6f0d79520857ebe7085813ba60ebb39f8e82e50fee11b76ea4b4508a54b8478
                                                • Instruction Fuzzy Hash: D3E01A36290214AFC710EF69D844B9AB7E8AF98761F008026F849C7352DAB0A8418BA0
                                                APIs
                                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00A34F18
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: mouse_event
                                                • String ID:
                                                • API String ID: 2434400541-0
                                                • Opcode ID: 6ac57284be0362f80dfbfb9b3a315b9e1d9ce89a01ddcb48dc9cc551123b4785
                                                • Instruction ID: 66d153fff204ab1938c6c8af9b069a93cf2ed0a14a0378b11843cb2492c74e6d
                                                • Opcode Fuzzy Hash: 6ac57284be0362f80dfbfb9b3a315b9e1d9ce89a01ddcb48dc9cc551123b4785
                                                • Instruction Fuzzy Hash: 37D05EB01642053DFC184B20AC0FF774508F348F82F9C49893201854C1A8E57C00E034
                                                APIs
                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A288D1), ref: 00A28CB3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LogonUser
                                                • String ID:
                                                • API String ID: 1244722697-0
                                                • Opcode ID: 80577bfc43f58b9a8351401327a6e7a2ce9284cc09351f5ab1c717410525365c
                                                • Instruction ID: 80d80b6d921834854b376627c644e206baf167a4a9726a6a063ebe5af6ce1018
                                                • Opcode Fuzzy Hash: 80577bfc43f58b9a8351401327a6e7a2ce9284cc09351f5ab1c717410525365c
                                                • Instruction Fuzzy Hash: CDD05E3226060EAFEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                APIs
                                                • GetUserNameW.ADVAPI32(?,?), ref: 00A12242
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: 1ebaa9d2e20517909a52f99df97c4f66e740a7a7660cbb9cc100226e6b7c9785
                                                • Instruction ID: 50f40c687a90f616a48de2943d82559430a8222c247f080dff21971077486190
                                                • Opcode Fuzzy Hash: 1ebaa9d2e20517909a52f99df97c4f66e740a7a7660cbb9cc100226e6b7c9785
                                                • Instruction Fuzzy Hash: 1DC04CF1805109DBDB05DB90D988DEE77BCBB04315F144055A101F2140E7749B448A71
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 009FA36A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 7cc2714722399e8c8af2f30985544aa54952d81a449c44c67a1f2cfc698cd2a4
                                                • Instruction ID: f22764e2980143e8cf1930cd422fdda682ce561c892da71016f3c5325d7a70c3
                                                • Opcode Fuzzy Hash: 7cc2714722399e8c8af2f30985544aa54952d81a449c44c67a1f2cfc698cd2a4
                                                • Instruction Fuzzy Hash: 29A0113000020CAB8A002F82EC08888BFACEA002A2B008020F80C880328B32A8228A80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b7ed12308d5b723b19aba8ee3992009e8d24fc6c456eebdcfb7db6ec418776da
                                                • Instruction ID: 66edef2acf60f0b9bd91bafdfda1dd47854d50a5d48d5fa088d5927946a86d17
                                                • Opcode Fuzzy Hash: b7ed12308d5b723b19aba8ee3992009e8d24fc6c456eebdcfb7db6ec418776da
                                                • Instruction Fuzzy Hash: E7222B309055A6CBDF2ACBAAD49467F77B5FB02300F39447AD88A9B191DB34DD81CB60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                • Instruction ID: af93518b1083117c9d47761b18a1f544df665da70cc07a70ee130e7abb99a96c
                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                • Instruction Fuzzy Hash: DFC184322051974ADF2D473AD43423EBAE59EA27B131A0B5EE5B3CB5D4EF20D624D720
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                • Instruction ID: 929930da980a5139197881cd0452b2453c59846b0c4818a4d9ceac0a76502526
                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                • Instruction Fuzzy Hash: 4BC1B53220519749DF2D473AD43413EBBE59BA27B131A0B6DE9B2DB5C4EF20D624E720
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction ID: d2bd532dfec41aba44702cee1e47725bbfd1a6b0a915174a1eac7c8eb11132ac
                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction Fuzzy Hash: C3C1D53221919789DF2D463AC43403EBBE59EA27B131A0B6DE5B3CB5C4EF20D624D760
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00A47B70
                                                • DeleteObject.GDI32(00000000), ref: 00A47B82
                                                • DestroyWindow.USER32 ref: 00A47B90
                                                • GetDesktopWindow.USER32 ref: 00A47BAA
                                                • GetWindowRect.USER32(00000000), ref: 00A47BB1
                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00A47CF2
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00A47D02
                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47D4A
                                                • GetClientRect.USER32(00000000,?), ref: 00A47D56
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A47D90
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DB2
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DC5
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DD0
                                                • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DD9
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DE8
                                                • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DF1
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47DF8
                                                • GlobalFree.KERNEL32(00000000), ref: 00A47E03
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47E15
                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00A62CAC,00000000), ref: 00A47E2B
                                                • GlobalFree.KERNEL32(00000000), ref: 00A47E3B
                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00A47E61
                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00A47E80
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A47EA2
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A4808F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: 2b0f15cf53c5233ea769c59554b1deb7612dc3ce2d89f10a379303ae6fa952c4
                                                • Instruction ID: c4e7af4cc68f6e4279e48911830462dd5e1ad952f395ab15df042ec2600197b1
                                                • Opcode Fuzzy Hash: 2b0f15cf53c5233ea769c59554b1deb7612dc3ce2d89f10a379303ae6fa952c4
                                                • Instruction Fuzzy Hash: E6028F75A00205EFDB14DFA8DC89EAE7BB9FF88311F148159F915AB2A1CB709D01CB60
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,00A5F910), ref: 00A538AF
                                                • IsWindowVisible.USER32(?), ref: 00A538D3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharUpperVisibleWindow
                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                • API String ID: 4105515805-45149045
                                                • Opcode ID: 318b7ee1d542fa50712af5c2a7f5a95c17acfb789e6850ae97cbc032e58af562
                                                • Instruction ID: a4893647a525ff98a01d0ebe9a406756f6e18699f19f882c8c8f864b8a895655
                                                • Opcode Fuzzy Hash: 318b7ee1d542fa50712af5c2a7f5a95c17acfb789e6850ae97cbc032e58af562
                                                • Instruction Fuzzy Hash: D8D15A312143199BCB24EF24C551A6AB7A5BFD5385F108469BC865B3A3CB31EE0ECB91
                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 00A5A89F
                                                • GetSysColorBrush.USER32(0000000F), ref: 00A5A8D0
                                                • GetSysColor.USER32(0000000F), ref: 00A5A8DC
                                                • SetBkColor.GDI32(?,000000FF), ref: 00A5A8F6
                                                • SelectObject.GDI32(?,?), ref: 00A5A905
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00A5A930
                                                • GetSysColor.USER32(00000010), ref: 00A5A938
                                                • CreateSolidBrush.GDI32(00000000), ref: 00A5A93F
                                                • FrameRect.USER32(?,?,00000000), ref: 00A5A94E
                                                • DeleteObject.GDI32(00000000), ref: 00A5A955
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00A5A9A0
                                                • FillRect.USER32(?,?,?), ref: 00A5A9D2
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A5A9FD
                                                  • Part of subcall function 00A5AB60: GetSysColor.USER32(00000012), ref: 00A5AB99
                                                  • Part of subcall function 00A5AB60: SetTextColor.GDI32(?,?), ref: 00A5AB9D
                                                  • Part of subcall function 00A5AB60: GetSysColorBrush.USER32(0000000F), ref: 00A5ABB3
                                                  • Part of subcall function 00A5AB60: GetSysColor.USER32(0000000F), ref: 00A5ABBE
                                                  • Part of subcall function 00A5AB60: GetSysColor.USER32(00000011), ref: 00A5ABDB
                                                  • Part of subcall function 00A5AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A5ABE9
                                                  • Part of subcall function 00A5AB60: SelectObject.GDI32(?,00000000), ref: 00A5ABFA
                                                  • Part of subcall function 00A5AB60: SetBkColor.GDI32(?,00000000), ref: 00A5AC03
                                                  • Part of subcall function 00A5AB60: SelectObject.GDI32(?,?), ref: 00A5AC10
                                                  • Part of subcall function 00A5AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00A5AC2F
                                                  • Part of subcall function 00A5AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A5AC46
                                                  • Part of subcall function 00A5AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00A5AC5B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                • String ID:
                                                • API String ID: 4124339563-0
                                                • Opcode ID: 7ca6a73685a93fefeabac62ce04faee504255ee9d68c10814d029bfa0a3027cc
                                                • Instruction ID: 69ded61903a7d5bd97826b5a17626929d654c08dac726873d0c83801b251dae3
                                                • Opcode Fuzzy Hash: 7ca6a73685a93fefeabac62ce04faee504255ee9d68c10814d029bfa0a3027cc
                                                • Instruction Fuzzy Hash: B1A17F72108301EFD711DFA4DC08A6B7BA9FF88322F104B29FA62961E1D771D945CB52
                                                APIs
                                                • DestroyWindow.USER32(?,?,?), ref: 009D2CA2
                                                • DeleteObject.GDI32(00000000), ref: 009D2CE8
                                                • DeleteObject.GDI32(00000000), ref: 009D2CF3
                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 009D2CFE
                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 009D2D09
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A0C68B
                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A0C6C4
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A0CAED
                                                  • Part of subcall function 009D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009D2036,?,00000000,?,?,?,?,009D16CB,00000000,?), ref: 009D1B9A
                                                • SendMessageW.USER32(?,00001053), ref: 00A0CB2A
                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A0CB41
                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A0CB57
                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A0CB62
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                • String ID: 0
                                                • API String ID: 464785882-4108050209
                                                • Opcode ID: 87459dd8a45ad7b28ac3c082ccecacfb9b56d5fba47219872b527bce1cbd1a26
                                                • Instruction ID: 20a821def873aa01955808be3f039b7e0637e1e328d349f0ea82f480f7c393d6
                                                • Opcode Fuzzy Hash: 87459dd8a45ad7b28ac3c082ccecacfb9b56d5fba47219872b527bce1cbd1a26
                                                • Instruction Fuzzy Hash: AB12BF30600205EFDB21CF24D884BA9B7E5FF55361F5486AAF895DB2A2C731EC42CB91
                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 00A477F1
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A478B0
                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00A478EE
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00A47900
                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00A47946
                                                • GetClientRect.USER32(00000000,?), ref: 00A47952
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00A47996
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A479A5
                                                • GetStockObject.GDI32(00000011), ref: 00A479B5
                                                • SelectObject.GDI32(00000000,00000000), ref: 00A479B9
                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00A479C9
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A479D2
                                                • DeleteDC.GDI32(00000000), ref: 00A479DB
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A47A07
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A47A1E
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00A47A59
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A47A6D
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A47A7E
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00A47AAE
                                                • GetStockObject.GDI32(00000011), ref: 00A47AB9
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A47AC4
                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00A47ACE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: 86c521ddfded773848fc387884a92fc458b023fbcef3abac69c22debc1065c17
                                                • Instruction ID: 858fe6f857c2ff3eb3f27c31c49d4b0fd47c6c345a506143f5fa5b78667413b8
                                                • Opcode Fuzzy Hash: 86c521ddfded773848fc387884a92fc458b023fbcef3abac69c22debc1065c17
                                                • Instruction Fuzzy Hash: 33A15C71A40215BFEB14DBA8DD4AFAE7BA9FF48711F008115FA15A72E0DB70AD01CB60
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00A3AF89
                                                • GetDriveTypeW.KERNEL32(?,00A5FAC0,?,\\.\,00A5F910), ref: 00A3B066
                                                • SetErrorMode.KERNEL32(00000000,00A5FAC0,?,\\.\,00A5F910), ref: 00A3B1C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 8e8237fcb8635c0d78eab93f968c40dabd752b84b1ce207b450de83bcfaba66f
                                                • Instruction ID: 17cbb89e05a3a4415f8f72c3b35ce94c1d73c8a46c82f9458ae2ac92f9c2f0ab
                                                • Opcode Fuzzy Hash: 8e8237fcb8635c0d78eab93f968c40dabd752b84b1ce207b450de83bcfaba66f
                                                • Instruction Fuzzy Hash: 8051C3306A4305FFDB04EB50C99297D73B2BB65341F208617F60AE7290D7B5AD41EBA2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 1038674560-86951937
                                                • Opcode ID: 0a275bd8f54ad619eb3f751f7a94249a2aadc631bbc4eea7eae1246010d99a1b
                                                • Instruction ID: b14fea56b57b6b5973cb1720e25a02e9c81ac2d2cb6f5d8ba293c14d56db72a9
                                                • Opcode Fuzzy Hash: 0a275bd8f54ad619eb3f751f7a94249a2aadc631bbc4eea7eae1246010d99a1b
                                                • Instruction Fuzzy Hash: 42811C70684609BADB20EF61DD82FBE7768BF50700F04C426FD46A62C2EB74EA45D791
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 00A5AB99
                                                • SetTextColor.GDI32(?,?), ref: 00A5AB9D
                                                • GetSysColorBrush.USER32(0000000F), ref: 00A5ABB3
                                                • GetSysColor.USER32(0000000F), ref: 00A5ABBE
                                                • CreateSolidBrush.GDI32(?), ref: 00A5ABC3
                                                • GetSysColor.USER32(00000011), ref: 00A5ABDB
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A5ABE9
                                                • SelectObject.GDI32(?,00000000), ref: 00A5ABFA
                                                • SetBkColor.GDI32(?,00000000), ref: 00A5AC03
                                                • SelectObject.GDI32(?,?), ref: 00A5AC10
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00A5AC2F
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A5AC46
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00A5AC5B
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A5ACA7
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A5ACCE
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00A5ACEC
                                                • DrawFocusRect.USER32(?,?), ref: 00A5ACF7
                                                • GetSysColor.USER32(00000011), ref: 00A5AD05
                                                • SetTextColor.GDI32(?,00000000), ref: 00A5AD0D
                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A5AD21
                                                • SelectObject.GDI32(?,00A5A869), ref: 00A5AD38
                                                • DeleteObject.GDI32(?), ref: 00A5AD43
                                                • SelectObject.GDI32(?,?), ref: 00A5AD49
                                                • DeleteObject.GDI32(?), ref: 00A5AD4E
                                                • SetTextColor.GDI32(?,?), ref: 00A5AD54
                                                • SetBkColor.GDI32(?,?), ref: 00A5AD5E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: baa9e010dc32b8631691dce5e08d029424553e8afe1edc4834af9210515c8111
                                                • Instruction ID: bf5378e43ed7f750f2c89bd26d8922b3354cc39f7ed5fe89ce65389ce9b273e0
                                                • Opcode Fuzzy Hash: baa9e010dc32b8631691dce5e08d029424553e8afe1edc4834af9210515c8111
                                                • Instruction Fuzzy Hash: B0614C71900218AFDF11DFA4DC48AAE7B79FB08322F118225FA15AB2A1D7719D41DB90
                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A58D34
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A58D45
                                                • CharNextW.USER32(0000014E), ref: 00A58D74
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A58DB5
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A58DCB
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A58DDC
                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A58DF9
                                                • SetWindowTextW.USER32(?,0000014E), ref: 00A58E45
                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A58E5B
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A58E8C
                                                • _memset.LIBCMT ref: 00A58EB1
                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A58EFA
                                                • _memset.LIBCMT ref: 00A58F59
                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A58F83
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A58FDB
                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00A59088
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A590AA
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A590F4
                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A59121
                                                • DrawMenuBar.USER32(?), ref: 00A59130
                                                • SetWindowTextW.USER32(?,0000014E), ref: 00A59158
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                • String ID: 0
                                                • API String ID: 1073566785-4108050209
                                                • Opcode ID: 11e1630ede3012f497da4cf10edb2fea72ee40afaa7be5a72408b4ef4e89599e
                                                • Instruction ID: caf9a82c8debefe2b8477062f63e2d779c3724456d883db6ff92f607f2ec5d2d
                                                • Opcode Fuzzy Hash: 11e1630ede3012f497da4cf10edb2fea72ee40afaa7be5a72408b4ef4e89599e
                                                • Instruction Fuzzy Hash: 21E16E71901219AEDF20DFA0CC84AEF7BB9FF05711F10815AFD15AA291DB748A89DF60
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00A54C51
                                                • GetDesktopWindow.USER32 ref: 00A54C66
                                                • GetWindowRect.USER32(00000000), ref: 00A54C6D
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A54CCF
                                                • DestroyWindow.USER32(?), ref: 00A54CFB
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A54D24
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A54D42
                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A54D68
                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00A54D7D
                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A54D90
                                                • IsWindowVisible.USER32(?), ref: 00A54DB0
                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A54DCB
                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A54DDF
                                                • GetWindowRect.USER32(?,?), ref: 00A54DF7
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00A54E1D
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00A54E37
                                                • CopyRect.USER32(?,?), ref: 00A54E4E
                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00A54EB9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: 40822dc2d1a7bf87729ba221e6933565764f4321e2353cf7a7dc26ddae3a226e
                                                • Instruction ID: df542ada836db58712495b1bca04472c289f8b40d859c1aeeeb4d0aaa368336d
                                                • Opcode Fuzzy Hash: 40822dc2d1a7bf87729ba221e6933565764f4321e2353cf7a7dc26ddae3a226e
                                                • Instruction Fuzzy Hash: B6B19D71608340AFDB04DF65C849B6ABBE4FF88315F00891DF9999B2A1D771EC49CB91
                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009D28BC
                                                • GetSystemMetrics.USER32(00000007), ref: 009D28C4
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009D28EF
                                                • GetSystemMetrics.USER32(00000008), ref: 009D28F7
                                                • GetSystemMetrics.USER32(00000004), ref: 009D291C
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009D2939
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009D2949
                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009D297C
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009D2990
                                                • GetClientRect.USER32(00000000,000000FF), ref: 009D29AE
                                                • GetStockObject.GDI32(00000011), ref: 009D29CA
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 009D29D5
                                                  • Part of subcall function 009D2344: GetCursorPos.USER32(?), ref: 009D2357
                                                  • Part of subcall function 009D2344: ScreenToClient.USER32(00A967B0,?), ref: 009D2374
                                                  • Part of subcall function 009D2344: GetAsyncKeyState.USER32(00000001), ref: 009D2399
                                                  • Part of subcall function 009D2344: GetAsyncKeyState.USER32(00000002), ref: 009D23A7
                                                • SetTimer.USER32(00000000,00000000,00000028,009D1256), ref: 009D29FC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: 6911e2378e3e024240ed8a1bf671a5d865174be27eab6d6cd4abd6b7dffec502
                                                • Instruction ID: 91b8d1cbc050e5077bfd2c36865a3a1981aa954b374d248017cd2d90cdc722c9
                                                • Opcode Fuzzy Hash: 6911e2378e3e024240ed8a1bf671a5d865174be27eab6d6cd4abd6b7dffec502
                                                • Instruction Fuzzy Hash: 20B17C71A4020AEFDB14DFA8DC45BAE7BB4FF58315F10822AFA15A72D0DB74A841CB51
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00A540F6
                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A541B6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharMessageSendUpper
                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                • API String ID: 3974292440-719923060
                                                • Opcode ID: aaca96e628a636ce8840100062580e857a9a7b24ac2cceff9674b5ef784fa5d4
                                                • Instruction ID: 2b4d3ca2eac2f29edcb84903506950af76ec8ca9bb3482ab26a879e25eff15da
                                                • Opcode Fuzzy Hash: aaca96e628a636ce8840100062580e857a9a7b24ac2cceff9674b5ef784fa5d4
                                                • Instruction Fuzzy Hash: 39A1AE302143159FCB14FF24C951B6AB3A5BF89319F108969BC9A9B7E2DB30EC49CB51
                                                APIs
                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00A45309
                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00A45314
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00A4531F
                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00A4532A
                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00A45335
                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00A45340
                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00A4534B
                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00A45356
                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00A45361
                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00A4536C
                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00A45377
                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00A45382
                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00A4538D
                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00A45398
                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00A453A3
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00A453AE
                                                • GetCursorInfo.USER32(?), ref: 00A453BE
                                                • GetLastError.KERNEL32(00000001,00000000), ref: 00A453E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Cursor$Load$ErrorInfoLast
                                                • String ID:
                                                • API String ID: 3215588206-0
                                                • Opcode ID: 6ab18803ed8d07add7c925bc175658bc3e3d5eea60ba00a71729b31ec96b5f4b
                                                • Instruction ID: 9ce6120ed70254228289b5623022c74c92c221424a36c5773980ceedf318467d
                                                • Opcode Fuzzy Hash: 6ab18803ed8d07add7c925bc175658bc3e3d5eea60ba00a71729b31ec96b5f4b
                                                • Instruction Fuzzy Hash: 3F415470E443196BDB109FBA8C4996FFFF8EF91B50B10452FF509EB291DAB894018E61
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A2AAA5
                                                • __swprintf.LIBCMT ref: 00A2AB46
                                                • _wcscmp.LIBCMT ref: 00A2AB59
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A2ABAE
                                                • _wcscmp.LIBCMT ref: 00A2ABEA
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00A2AC21
                                                • GetDlgCtrlID.USER32(?), ref: 00A2AC73
                                                • GetWindowRect.USER32(?,?), ref: 00A2ACA9
                                                • GetParent.USER32(?), ref: 00A2ACC7
                                                • ScreenToClient.USER32(00000000), ref: 00A2ACCE
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A2AD48
                                                • _wcscmp.LIBCMT ref: 00A2AD5C
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00A2AD82
                                                • _wcscmp.LIBCMT ref: 00A2AD96
                                                  • Part of subcall function 009F386C: _iswctype.LIBCMT ref: 009F3874
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                • String ID: %s%u
                                                • API String ID: 3744389584-679674701
                                                • Opcode ID: df9503bb26494fa2fdb07919b11bfca5bd9e9f3914d9cdad7017e4e02dfc9d20
                                                • Instruction ID: 91bb5b7096cc287a7a1b83d35154709c5e6ef4a26169fc0fd69a73e1c20e6292
                                                • Opcode Fuzzy Hash: df9503bb26494fa2fdb07919b11bfca5bd9e9f3914d9cdad7017e4e02dfc9d20
                                                • Instruction Fuzzy Hash: 3FA11F31204726AFDB18DF68D884BAAF7E8FF54355F108639F999C2190DB30E945CB92
                                                APIs
                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00A2B3DB
                                                • _wcscmp.LIBCMT ref: 00A2B3EC
                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A2B414
                                                • CharUpperBuffW.USER32(?,00000000), ref: 00A2B431
                                                • _wcscmp.LIBCMT ref: 00A2B44F
                                                • _wcsstr.LIBCMT ref: 00A2B460
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00A2B498
                                                • _wcscmp.LIBCMT ref: 00A2B4A8
                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A2B4CF
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00A2B518
                                                • _wcscmp.LIBCMT ref: 00A2B528
                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00A2B550
                                                • GetWindowRect.USER32(00000004,?), ref: 00A2B5B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                • String ID: @$ThumbnailClass
                                                • API String ID: 1788623398-1539354611
                                                • Opcode ID: 1784ccdcc131289862aaa3f775c183dd783dd3e957bcc89ee28cb4ff3af1c42f
                                                • Instruction ID: 40641c76b7f8181926bc86f940c56f6a2ca06c15bfa5b60d5e79ae4fcc645550
                                                • Opcode Fuzzy Hash: 1784ccdcc131289862aaa3f775c183dd783dd3e957bcc89ee28cb4ff3af1c42f
                                                • Instruction Fuzzy Hash: 91818C710183199FDB04DF18E885FAA7BE8EF84314F188579FD858A0A2DB34DD45CB61
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                • API String ID: 1038674560-1810252412
                                                • Opcode ID: 6cbe1712fa01805c4ea18708480bd1563b2dd6c492c7589f1ee13781e693f4f0
                                                • Instruction ID: 3ab123be663e8d57df6e2695cfe85e6fc962a5d7d2cd3a9b2bf86a43320c4d58
                                                • Opcode Fuzzy Hash: 6cbe1712fa01805c4ea18708480bd1563b2dd6c492c7589f1ee13781e693f4f0
                                                • Instruction Fuzzy Hash: 23318D30A58319A6DB14FAA4DD43BFEB7A4AF10750F644826B442711D2EF616E04C761
                                                APIs
                                                • LoadIconW.USER32(00000063), ref: 00A2C4D4
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A2C4E6
                                                • SetWindowTextW.USER32(?,?), ref: 00A2C4FD
                                                • GetDlgItem.USER32(?,000003EA), ref: 00A2C512
                                                • SetWindowTextW.USER32(00000000,?), ref: 00A2C518
                                                • GetDlgItem.USER32(?,000003E9), ref: 00A2C528
                                                • SetWindowTextW.USER32(00000000,?), ref: 00A2C52E
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A2C54F
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A2C569
                                                • GetWindowRect.USER32(?,?), ref: 00A2C572
                                                • SetWindowTextW.USER32(?,?), ref: 00A2C5DD
                                                • GetDesktopWindow.USER32 ref: 00A2C5E3
                                                • GetWindowRect.USER32(00000000), ref: 00A2C5EA
                                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00A2C636
                                                • GetClientRect.USER32(?,?), ref: 00A2C643
                                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00A2C668
                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A2C693
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                • String ID:
                                                • API String ID: 3869813825-0
                                                • Opcode ID: cc07e3036ceb222962f7300b2f3ea994b270b9f7050538e27a57b39d3910d44b
                                                • Instruction ID: 852b8e10f654623059f5c05c46ef09f47a36ae02879379b31e6e16532cde6dff
                                                • Opcode Fuzzy Hash: cc07e3036ceb222962f7300b2f3ea994b270b9f7050538e27a57b39d3910d44b
                                                • Instruction Fuzzy Hash: 2B516B70900719AFDB20DFA8EE89B6FBBF5FF04715F004928E686A25A0D775E905CB50
                                                APIs
                                                • _memset.LIBCMT ref: 00A5A4C8
                                                • DestroyWindow.USER32(?,?), ref: 00A5A542
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A5A5BC
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A5A5DE
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A5A5F1
                                                • DestroyWindow.USER32(00000000), ref: 00A5A613
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009D0000,00000000), ref: 00A5A64A
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A5A663
                                                • GetDesktopWindow.USER32 ref: 00A5A67C
                                                • GetWindowRect.USER32(00000000), ref: 00A5A683
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A5A69B
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A5A6B3
                                                  • Part of subcall function 009D25DB: GetWindowLongW.USER32(?,000000EB), ref: 009D25EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 1297703922-3619404913
                                                • Opcode ID: 94e8a54e64e05dd6d2c1bf8dbb528e0cfc58b2e8db7653e0eacb2e9b67e14f34
                                                • Instruction ID: b3e0e68a01e0be3a2c508f62ac294ad76a54b5f2922af280c6d2cb1d0d0e8df5
                                                • Opcode Fuzzy Hash: 94e8a54e64e05dd6d2c1bf8dbb528e0cfc58b2e8db7653e0eacb2e9b67e14f34
                                                • Instruction Fuzzy Hash: 5B71AF75240345AFD720DF68DC49F667BE6FB98305F08462DF985872A0DB70E90ACB52
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • DragQueryPoint.SHELL32(?,?), ref: 00A5C917
                                                  • Part of subcall function 00A5ADF1: ClientToScreen.USER32(?,?), ref: 00A5AE1A
                                                  • Part of subcall function 00A5ADF1: GetWindowRect.USER32(?,?), ref: 00A5AE90
                                                  • Part of subcall function 00A5ADF1: PtInRect.USER32(?,?,00A5C304), ref: 00A5AEA0
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A5C980
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A5C98B
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A5C9AE
                                                • _wcscat.LIBCMT ref: 00A5C9DE
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A5C9F5
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A5CA0E
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00A5CA25
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00A5CA47
                                                • DragFinish.SHELL32(?), ref: 00A5CA4E
                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A5CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                • API String ID: 169749273-3440237614
                                                • Opcode ID: 8794f61dd645657d8ff9edba47e71ecb6b2d13434746e4e40435b9be3e9d542d
                                                • Instruction ID: 692b1b83900f3c1902369587fdf3b7c98b04eab9a239e05f813eba6ed60bb20d
                                                • Opcode Fuzzy Hash: 8794f61dd645657d8ff9edba47e71ecb6b2d13434746e4e40435b9be3e9d542d
                                                • Instruction Fuzzy Hash: CE613771108301AFC711EFA4D885E9BBBE8FFD8751F00492EF591962A1DB709A49CB52
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00A546AB
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A546F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharMessageSendUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 3974292440-4258414348
                                                • Opcode ID: 17ef0253938dd2929d866a18c914d73ac423214107629c5ceaa5974db7c75e47
                                                • Instruction ID: 9652d3f6cfc4dd1b1ff2e92433e0b470c79c2ccd4961e6eb5c2c0f309b7b7a9e
                                                • Opcode Fuzzy Hash: 17ef0253938dd2929d866a18c914d73ac423214107629c5ceaa5974db7c75e47
                                                • Instruction Fuzzy Hash: DE916A342047159FCB14EF24C451B6AB7A5BF99318F04886DBC965B7A3DB30ED4ACB81
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A5BB6E
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A56D80,?), ref: 00A5BBCA
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A5BC03
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A5BC46
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A5BC7D
                                                • FreeLibrary.KERNEL32(?), ref: 00A5BC89
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A5BC99
                                                • DestroyIcon.USER32(?), ref: 00A5BCA8
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A5BCC5
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A5BCD1
                                                  • Part of subcall function 009F313D: __wcsicmp_l.LIBCMT ref: 009F31C6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 1212759294-1154884017
                                                • Opcode ID: a4b0bd29297b5f00ffbc73e185239578a7ba4f216d8b394d1fcb9374f3e12345
                                                • Instruction ID: ece6ebecfeeef6d9ede4f7028a702a006ef2cf5a0c280dcca87ab31ea1998a5e
                                                • Opcode Fuzzy Hash: a4b0bd29297b5f00ffbc73e185239578a7ba4f216d8b394d1fcb9374f3e12345
                                                • Instruction Fuzzy Hash: B561CFB1650619BEEB14DF64CC45BBA77A8FB08712F20411AFD15D61D0DBB4AA84CBB0
                                                APIs
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • CharLowerBuffW.USER32(?,?), ref: 00A3A636
                                                • GetDriveTypeW.KERNEL32 ref: 00A3A683
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3A6CB
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3A702
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3A730
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                • API String ID: 2698844021-4113822522
                                                • Opcode ID: 15585ba3d2b3ab8b4d52b77d52d8f2526a3cb17267e43709d6eb461e358108fd
                                                • Instruction ID: 4dd0bdb46eb3563aa5dddf8dcc22f43e4694d4755beabee187f03632cd5f0da3
                                                • Opcode Fuzzy Hash: 15585ba3d2b3ab8b4d52b77d52d8f2526a3cb17267e43709d6eb461e358108fd
                                                • Instruction Fuzzy Hash: D7514C711047159FC700EF24C991A6AB7F8FF94718F04896EF896973A1EB31AE06CB52
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A3A47A
                                                • __swprintf.LIBCMT ref: 00A3A49C
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A3A4D9
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A3A4FE
                                                • _memset.LIBCMT ref: 00A3A51D
                                                • _wcsncpy.LIBCMT ref: 00A3A559
                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A3A58E
                                                • CloseHandle.KERNEL32(00000000), ref: 00A3A599
                                                • RemoveDirectoryW.KERNEL32(?), ref: 00A3A5A2
                                                • CloseHandle.KERNEL32(00000000), ref: 00A3A5AC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                • String ID: :$\$\??\%s
                                                • API String ID: 2733774712-3457252023
                                                • Opcode ID: 16094f4b053771176bb6e8a2dee04ec28c642c2c9a70d786bb549678b2743721
                                                • Instruction ID: 751d31fe9aae4a49f5db4e5738bad9f810388559e8b168c4032041e032d3a230
                                                • Opcode Fuzzy Hash: 16094f4b053771176bb6e8a2dee04ec28c642c2c9a70d786bb549678b2743721
                                                • Instruction Fuzzy Hash: B8319EB6500219ABDB21DFA0DC49FEB77BCEF98701F1041B6FA08D6160EB7496458B25
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                • String ID:
                                                • API String ID: 884005220-0
                                                • Opcode ID: b23ff62fce0bbc725c79ac2f0ada3ae0c246e0fecd3a4a77edae33a7488dc4df
                                                • Instruction ID: 0e351ad76e3d360e285d3fb319f0fb4d31a7f1ec782defe1ef0f036ad5231005
                                                • Opcode Fuzzy Hash: b23ff62fce0bbc725c79ac2f0ada3ae0c246e0fecd3a4a77edae33a7488dc4df
                                                • Instruction Fuzzy Hash: EC61F47291030DAFEB209F64FC41B7A77A5EF66325F244216E9059B1D1DB74CC42C792
                                                APIs
                                                • __wsplitpath.LIBCMT ref: 00A3DC7B
                                                • _wcscat.LIBCMT ref: 00A3DC93
                                                • _wcscat.LIBCMT ref: 00A3DCA5
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A3DCBA
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3DCCE
                                                • GetFileAttributesW.KERNEL32(?), ref: 00A3DCE6
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A3DD00
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3DD12
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                • String ID: *.*
                                                • API String ID: 34673085-438819550
                                                • Opcode ID: 5fce49e8737ef29ae55ec73994e7313203482d9d95287d7b6ac765bb4e792945
                                                • Instruction ID: 80f874e822be888a1481de7df8ab0f0f1ea2ddbe4262dd248b48e4be31aa0b57
                                                • Opcode Fuzzy Hash: 5fce49e8737ef29ae55ec73994e7313203482d9d95287d7b6ac765bb4e792945
                                                • Instruction Fuzzy Hash: DA818071514345DFCB64EF64D885AAAF7E8BF88350F19882EF889CB250E730E945CB52
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A5C4EC
                                                • GetFocus.USER32 ref: 00A5C4FC
                                                • GetDlgCtrlID.USER32(00000000), ref: 00A5C507
                                                • _memset.LIBCMT ref: 00A5C632
                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A5C65D
                                                • GetMenuItemCount.USER32(?), ref: 00A5C67D
                                                • GetMenuItemID.USER32(?,00000000), ref: 00A5C690
                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A5C6C4
                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A5C70C
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A5C744
                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A5C779
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                • String ID: 0
                                                • API String ID: 1296962147-4108050209
                                                • Opcode ID: 4589b009eafdfcd6d9adfe670c997ad081bf9b3c3237b37c847935127432efae
                                                • Instruction ID: 650a0234fb6c1ee89a10574529f587d88f57b6ba75a40c9e648d4dc2b672da51
                                                • Opcode Fuzzy Hash: 4589b009eafdfcd6d9adfe670c997ad081bf9b3c3237b37c847935127432efae
                                                • Instruction Fuzzy Hash: C5817D70208311AFD710CF64C984A6BBBE8FF88366F10452EFD9597295D770D909CBA2
                                                APIs
                                                  • Part of subcall function 00A2874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28766
                                                  • Part of subcall function 00A2874A: GetLastError.KERNEL32(?,00A2822A,?,?,?), ref: 00A28770
                                                  • Part of subcall function 00A2874A: GetProcessHeap.KERNEL32(00000008,?,?,00A2822A,?,?,?), ref: 00A2877F
                                                  • Part of subcall function 00A2874A: HeapAlloc.KERNEL32(00000000,?,00A2822A,?,?,?), ref: 00A28786
                                                  • Part of subcall function 00A2874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A2879D
                                                  • Part of subcall function 00A287E7: GetProcessHeap.KERNEL32(00000008,00A28240,00000000,00000000,?,00A28240,?), ref: 00A287F3
                                                  • Part of subcall function 00A287E7: HeapAlloc.KERNEL32(00000000,?,00A28240,?), ref: 00A287FA
                                                  • Part of subcall function 00A287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A28240,?), ref: 00A2880B
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A28458
                                                • _memset.LIBCMT ref: 00A2846D
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A2848C
                                                • GetLengthSid.ADVAPI32(?), ref: 00A2849D
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00A284DA
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A284F6
                                                • GetLengthSid.ADVAPI32(?), ref: 00A28513
                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A28522
                                                • HeapAlloc.KERNEL32(00000000), ref: 00A28529
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A2854A
                                                • CopySid.ADVAPI32(00000000), ref: 00A28551
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A28582
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A285A8
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A285BC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                • String ID:
                                                • API String ID: 3996160137-0
                                                • Opcode ID: 674e91761aa9f3df51595d17d98e5a49b3221c79a0b57dbd6e75e37a2d54da41
                                                • Instruction ID: a1c9c339d691e7c3d8a9da79b7da287126350a5db2fb56f613f88a6eee949476
                                                • Opcode Fuzzy Hash: 674e91761aa9f3df51595d17d98e5a49b3221c79a0b57dbd6e75e37a2d54da41
                                                • Instruction Fuzzy Hash: 46615C71901219AFDF00DFA8ED45AEEBBB9FF04311F048169F915A7291EB399A05CF60
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00A476A2
                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00A476AE
                                                • CreateCompatibleDC.GDI32(?), ref: 00A476BA
                                                • SelectObject.GDI32(00000000,?), ref: 00A476C7
                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00A4771B
                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00A47757
                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00A4777B
                                                • SelectObject.GDI32(00000006,?), ref: 00A47783
                                                • DeleteObject.GDI32(?), ref: 00A4778C
                                                • DeleteDC.GDI32(00000006), ref: 00A47793
                                                • ReleaseDC.USER32(00000000,?), ref: 00A4779E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: 2e52040d47cedb636028e61339010178686ebe4cc05ad9ce8cd64ed3e05057c6
                                                • Instruction ID: 97fbd3837495be658910acaabe0b2664a28a23e11c29374b071fd37cb9599aea
                                                • Opcode Fuzzy Hash: 2e52040d47cedb636028e61339010178686ebe4cc05ad9ce8cd64ed3e05057c6
                                                • Instruction Fuzzy Hash: 88513775904349EFCB15CFA8DC84EAEBBB9FF88310F148529F94A97250D731A8418B60
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,00A5FB78), ref: 00A3A0FC
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                • LoadStringW.USER32(?,?,00000FFF,?), ref: 00A3A11E
                                                • __swprintf.LIBCMT ref: 00A3A177
                                                • __swprintf.LIBCMT ref: 00A3A190
                                                • _wprintf.LIBCMT ref: 00A3A246
                                                • _wprintf.LIBCMT ref: 00A3A264
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 311963372-2391861430
                                                • Opcode ID: 08dba501b82c8e9b790f893b8368b1e8fad56f45b851ed329cf4d30f7551788a
                                                • Instruction ID: eac4fe4b91a963e885566033e60823cbbfcad5bb977b9b0dc938c629230ca026
                                                • Opcode Fuzzy Hash: 08dba501b82c8e9b790f893b8368b1e8fad56f45b851ed329cf4d30f7551788a
                                                • Instruction Fuzzy Hash: EA51897194021ABBCF15EBE0CE86FEEB778AF54300F108566B505722A1EB316F49CB61
                                                APIs
                                                  • Part of subcall function 009F0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,009D6C6C,?,00008000), ref: 009F0BB7
                                                  • Part of subcall function 009D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D48A1,?,?,009D37C0,?), ref: 009D48CE
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009D6D0D
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 009D6E5A
                                                  • Part of subcall function 009D59CD: _wcscpy.LIBCMT ref: 009D5A05
                                                  • Part of subcall function 009F387D: _iswctype.LIBCMT ref: 009F3885
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                • API String ID: 537147316-1018226102
                                                • Opcode ID: 0249b884895821dd3b0b4102ac298446379fec88c1e65016464bcba4c84f595f
                                                • Instruction ID: 827988a05f1c6cd260ed93d2dfdc86dc9fd75286f3919e7fca0bbac1998b7a20
                                                • Opcode Fuzzy Hash: 0249b884895821dd3b0b4102ac298446379fec88c1e65016464bcba4c84f595f
                                                • Instruction Fuzzy Hash: 810298311483459FC724EF24C891AAFBBE5AFD8354F048D2EF486972A1DB30D949DB52
                                                APIs
                                                • _memset.LIBCMT ref: 009D45F9
                                                • GetMenuItemCount.USER32(00A96890), ref: 00A0D7CD
                                                • GetMenuItemCount.USER32(00A96890), ref: 00A0D87D
                                                • GetCursorPos.USER32(?), ref: 00A0D8C1
                                                • SetForegroundWindow.USER32(00000000), ref: 00A0D8CA
                                                • TrackPopupMenuEx.USER32(00A96890,00000000,?,00000000,00000000,00000000), ref: 00A0D8DD
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A0D8E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                • String ID:
                                                • API String ID: 2751501086-0
                                                • Opcode ID: 905fd0931ffdfd671b5dd8012f7528c339c46714d30091406f9fd9eae1d4ed36
                                                • Instruction ID: 2221291d73e33f6f55392c6c5540453959946666dfb7cd53224830b51aab2b81
                                                • Opcode Fuzzy Hash: 905fd0931ffdfd671b5dd8012f7528c339c46714d30091406f9fd9eae1d4ed36
                                                • Instruction Fuzzy Hash: 97710871641209BFEB209FA4EC89FAABF64FF05364F244216F515AA1E1D7B1AC10DB90
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A50038,?,?), ref: 00A510BC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 3964851224-909552448
                                                • Opcode ID: 0a809a93751511ba353b411c3aef7b670db903fdd3045527572f7a5c51b41adc
                                                • Instruction ID: 0025eb080a34651227515981d6514ca60b3c475a1a10805bb6911e6eb0ec1833
                                                • Opcode Fuzzy Hash: 0a809a93751511ba353b411c3aef7b670db903fdd3045527572f7a5c51b41adc
                                                • Instruction Fuzzy Hash: 0C41083015424E8BCF20EF90D895BFE3725BF96341F504669FD955B292EB30AD1ACBA0
                                                APIs
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                  • Part of subcall function 009D7A84: _memmove.LIBCMT ref: 009D7B0D
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A355D2
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A355E8
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A355F9
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A3560B
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A3561C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: SendString$_memmove
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2279737902-1007645807
                                                • Opcode ID: 7234de2b48c98cf112de4b8952641bf68645f83f03835f8fa2dec93e06afb622
                                                • Instruction ID: 16f393101c6728bbbaae5b71b670e66c165f2a0864b15fa9a0f3a6e61c98d702
                                                • Opcode Fuzzy Hash: 7234de2b48c98cf112de4b8952641bf68645f83f03835f8fa2dec93e06afb622
                                                • Instruction Fuzzy Hash: AB11602499056979E720B7B5CC4AEFFBB7CFFE5B00F44486BB401A61D1EA601E05C6A1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                • String ID: 0.0.0.0
                                                • API String ID: 208665112-3771769585
                                                • Opcode ID: fa354d8f502e63c0243909b804fda7a3b24e3ba671904c5d716944a02617e61d
                                                • Instruction ID: d28f91d3d04acf3c0b52c5c4e2724a5905597a6170e61b69b2e8442c54a8daa7
                                                • Opcode Fuzzy Hash: fa354d8f502e63c0243909b804fda7a3b24e3ba671904c5d716944a02617e61d
                                                • Instruction Fuzzy Hash: E111E731904218AFCB20EB74EC46FEB77BCEF44721F0401B6F504960A1EF71AA818791
                                                APIs
                                                • timeGetTime.WINMM ref: 00A3521C
                                                  • Part of subcall function 009F0719: timeGetTime.WINMM(?,75C0B400,009E0FF9), ref: 009F071D
                                                • Sleep.KERNEL32(0000000A), ref: 00A35248
                                                • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00A3526C
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A3528E
                                                • SetActiveWindow.USER32 ref: 00A352AD
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A352BB
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A352DA
                                                • Sleep.KERNEL32(000000FA), ref: 00A352E5
                                                • IsWindow.USER32 ref: 00A352F1
                                                • EndDialog.USER32(00000000), ref: 00A35302
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: 12a7260028e7415119170aaf78c532bddd0b1b89c38c93b003ea067c9d7c3671
                                                • Instruction ID: 3c856db56c1cb38c5a8483bd339328f4761fe49c12f6bee612d373abfd15685b
                                                • Opcode Fuzzy Hash: 12a7260028e7415119170aaf78c532bddd0b1b89c38c93b003ea067c9d7c3671
                                                • Instruction Fuzzy Hash: 20218C70604704AFE701EBF4EDC9A6A7BA9FB56387F01142AF502861B1DF719C428B72
                                                APIs
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • CoInitialize.OLE32(00000000), ref: 00A3D855
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A3D8E8
                                                • SHGetDesktopFolder.SHELL32(?), ref: 00A3D8FC
                                                • CoCreateInstance.OLE32(00A62D7C,00000000,00000001,00A8A89C,?), ref: 00A3D948
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A3D9B7
                                                • CoTaskMemFree.OLE32(?,?), ref: 00A3DA0F
                                                • _memset.LIBCMT ref: 00A3DA4C
                                                • SHBrowseForFolderW.SHELL32(?), ref: 00A3DA88
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A3DAAB
                                                • CoTaskMemFree.OLE32(00000000), ref: 00A3DAB2
                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00A3DAE9
                                                • CoUninitialize.OLE32(00000001,00000000), ref: 00A3DAEB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                • String ID:
                                                • API String ID: 1246142700-0
                                                • Opcode ID: fdc20024b35f6eb7de39a63cd9ffeb96e4937380da2888885c180c4ffa4d19cc
                                                • Instruction ID: 572ffa13d4566ea8e248a6e16fae6657007366d4be5466c5f7eb4cacc1f4c714
                                                • Opcode Fuzzy Hash: fdc20024b35f6eb7de39a63cd9ffeb96e4937380da2888885c180c4ffa4d19cc
                                                • Instruction Fuzzy Hash: 59B1D975A00219EFDB04DFA4D988EAEBBB9FF89304F148469F509EB251DB30AD45CB50
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00A305A7
                                                • SetKeyboardState.USER32(?), ref: 00A30612
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00A30632
                                                • GetKeyState.USER32(000000A0), ref: 00A30649
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00A30678
                                                • GetKeyState.USER32(000000A1), ref: 00A30689
                                                • GetAsyncKeyState.USER32(00000011), ref: 00A306B5
                                                • GetKeyState.USER32(00000011), ref: 00A306C3
                                                • GetAsyncKeyState.USER32(00000012), ref: 00A306EC
                                                • GetKeyState.USER32(00000012), ref: 00A306FA
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00A30723
                                                • GetKeyState.USER32(0000005B), ref: 00A30731
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 126bdcc921f953e42b6c820ca82ded0d263dd515ea5425c663075a484937569c
                                                • Instruction ID: 07da150de25e8edc916eb8f73aee925a17d783c1557b91cf9b9271c813f9c2da
                                                • Opcode Fuzzy Hash: 126bdcc921f953e42b6c820ca82ded0d263dd515ea5425c663075a484937569c
                                                • Instruction Fuzzy Hash: 6E51EB60A0478819FB35DBB08965BEABFB49F01380F08859DE5C2561C2EBA49B4CCB55
                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 00A2C746
                                                • GetWindowRect.USER32(00000000,?), ref: 00A2C758
                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A2C7B6
                                                • GetDlgItem.USER32(?,00000002), ref: 00A2C7C1
                                                • GetWindowRect.USER32(00000000,?), ref: 00A2C7D3
                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A2C827
                                                • GetDlgItem.USER32(?,000003E9), ref: 00A2C835
                                                • GetWindowRect.USER32(00000000,?), ref: 00A2C846
                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A2C889
                                                • GetDlgItem.USER32(?,000003EA), ref: 00A2C897
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A2C8B4
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A2C8C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: 9446fb3a39f30872baa9877c2c4cf791bc396742985d61d76313aa292e4b878b
                                                • Instruction ID: 081335003e67dd6603574a574a85f907e8b2a32b918023d7a1d9bd19f6e9bce5
                                                • Opcode Fuzzy Hash: 9446fb3a39f30872baa9877c2c4cf791bc396742985d61d76313aa292e4b878b
                                                • Instruction Fuzzy Hash: FD511B71B00205AFDB18CFA9DD99AAEBBBAFB88311F14813DF616D7290D7709D018B50
                                                APIs
                                                  • Part of subcall function 009D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009D2036,?,00000000,?,?,?,?,009D16CB,00000000,?), ref: 009D1B9A
                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 009D20D3
                                                • KillTimer.USER32(-00000001,?,?,?,?,009D16CB,00000000,?,?,009D1AE2,?,?), ref: 009D216E
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00A0BEF6
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D16CB,00000000,?,?,009D1AE2,?,?), ref: 00A0BF27
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D16CB,00000000,?,?,009D1AE2,?,?), ref: 00A0BF3E
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D16CB,00000000,?,?,009D1AE2,?,?), ref: 00A0BF5A
                                                • DeleteObject.GDI32(00000000), ref: 00A0BF6C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: 2f9ff1db544f2112e412e1fe4b35f45948e7eb02ba354d2f6a562c1a38d0f39c
                                                • Instruction ID: 9acfeadfea8241ec4d3225b530f6efc1ce7b5db94bc82f350a8293b1a646c4b1
                                                • Opcode Fuzzy Hash: 2f9ff1db544f2112e412e1fe4b35f45948e7eb02ba354d2f6a562c1a38d0f39c
                                                • Instruction Fuzzy Hash: 50616C31254605DFCB25DF54DE48B25B7F1FF60316F10C92AE54297AA0CB75A882DF90
                                                APIs
                                                  • Part of subcall function 009D25DB: GetWindowLongW.USER32(?,000000EB), ref: 009D25EC
                                                • GetSysColor.USER32(0000000F), ref: 009D21D3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: 02fee34700f7d78d794feada16f642f423fc4aeefa56e37b6a4fff34899ef0cd
                                                • Instruction ID: 11580f512990b1e93c4148a3cfa782252f28f59468ae8a6d60627b2bf5d9e636
                                                • Opcode Fuzzy Hash: 02fee34700f7d78d794feada16f642f423fc4aeefa56e37b6a4fff34899ef0cd
                                                • Instruction Fuzzy Hash: 0B4191311446449FDB259F68EC48BB93B69FB16331F148366FE758A2E2C7318C42DB61
                                                APIs
                                                • CharLowerBuffW.USER32(?,?,00A5F910), ref: 00A3AB76
                                                • GetDriveTypeW.KERNEL32(00000061,00A8A620,00000061), ref: 00A3AC40
                                                • _wcscpy.LIBCMT ref: 00A3AC6A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2820617543-1000479233
                                                • Opcode ID: 654e6b141c514f6bd745d26a9e85c7adf875d850f5687d9dbdca59adbe719e97
                                                • Instruction ID: ff02d576a111a20c1eacb72255b6810bb74a7ff8e7db9d056f94dab9589825e5
                                                • Opcode Fuzzy Hash: 654e6b141c514f6bd745d26a9e85c7adf875d850f5687d9dbdca59adbe719e97
                                                • Instruction Fuzzy Hash: B951AA311483119FC724EF14C881BAAB7A9FFA1300F10882AF5C6972A2DB319D4ACB53
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __i64tow__itow__swprintf
                                                • String ID: %.15g$0x%p$False$True
                                                • API String ID: 421087845-2263619337
                                                • Opcode ID: 841c1127737171af497832e4549ed90ca2c9bdc00f718ed9cc2033d87181b238
                                                • Instruction ID: 9d5d138c14725acde4e1627ff31376664fc7e156023aa31014a62ce8cbf7e8e3
                                                • Opcode Fuzzy Hash: 841c1127737171af497832e4549ed90ca2c9bdc00f718ed9cc2033d87181b238
                                                • Instruction Fuzzy Hash: EB41E671544209AFDB34AF78EC42F7673E8EB84340F20886FE649E7291EA759941CB11
                                                APIs
                                                • _memset.LIBCMT ref: 00A573D9
                                                • CreateMenu.USER32 ref: 00A573F4
                                                • SetMenu.USER32(?,00000000), ref: 00A57403
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A57490
                                                • IsMenu.USER32(?), ref: 00A574A6
                                                • CreatePopupMenu.USER32 ref: 00A574B0
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A574DD
                                                • DrawMenuBar.USER32 ref: 00A574E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                • String ID: 0$F
                                                • API String ID: 176399719-3044882817
                                                • Opcode ID: df2350b9a14ee6031c457efe126dc7ea5a1f4afaebab011db527e25e9e33f27f
                                                • Instruction ID: ab4e85ca6554cc7ce49943c511e12aeef8bf21b86179c2d7db49dfa01075f0f6
                                                • Opcode Fuzzy Hash: df2350b9a14ee6031c457efe126dc7ea5a1f4afaebab011db527e25e9e33f27f
                                                • Instruction Fuzzy Hash: 18415674A01209EFDB20DFA5E884EAABBF9FF49342F144029FD55A7360DB30A914CB50
                                                APIs
                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A577CD
                                                • CreateCompatibleDC.GDI32(00000000), ref: 00A577D4
                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A577E7
                                                • SelectObject.GDI32(00000000,00000000), ref: 00A577EF
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A577FA
                                                • DeleteDC.GDI32(00000000), ref: 00A57803
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00A5780D
                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A57821
                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A5782D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                • String ID: static
                                                • API String ID: 2559357485-2160076837
                                                • Opcode ID: dcdc6299be6b629fbc56760a9f35b641af4c8239c106b9e0c5dbd2ea59ea0c63
                                                • Instruction ID: 02f53e7fb1534abb0c9bef4753724794152b57458786fbeb44a790454ac75dc1
                                                • Opcode Fuzzy Hash: dcdc6299be6b629fbc56760a9f35b641af4c8239c106b9e0c5dbd2ea59ea0c63
                                                • Instruction Fuzzy Hash: 7E313632105215BFDF129FA4EC09FDA3B69FF0D322F114225FA15A61A0DB319866DBA4
                                                APIs
                                                • _memset.LIBCMT ref: 009F707B
                                                  • Part of subcall function 009F8D68: __getptd_noexit.LIBCMT ref: 009F8D68
                                                • __gmtime64_s.LIBCMT ref: 009F7114
                                                • __gmtime64_s.LIBCMT ref: 009F714A
                                                • __gmtime64_s.LIBCMT ref: 009F7167
                                                • __allrem.LIBCMT ref: 009F71BD
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F71D9
                                                • __allrem.LIBCMT ref: 009F71F0
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F720E
                                                • __allrem.LIBCMT ref: 009F7225
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F7243
                                                • __invoke_watson.LIBCMT ref: 009F72B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                • String ID:
                                                • API String ID: 384356119-0
                                                • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                • Instruction ID: 6e836e91b11854c24a0c0fd2e2e1371a2bd16fd1c36bec0a1cf319662169ee5d
                                                • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                • Instruction Fuzzy Hash: 5471FB71A0471FABE7149EB9DD41BBAF3ACAF54324F14422AF624D72C1EB70D9408790
                                                APIs
                                                • _memset.LIBCMT ref: 00A32A31
                                                • GetMenuItemInfoW.USER32(00A96890,000000FF,00000000,00000030), ref: 00A32A92
                                                • SetMenuItemInfoW.USER32(00A96890,00000004,00000000,00000030), ref: 00A32AC8
                                                • Sleep.KERNEL32(000001F4), ref: 00A32ADA
                                                • GetMenuItemCount.USER32(?), ref: 00A32B1E
                                                • GetMenuItemID.USER32(?,00000000), ref: 00A32B3A
                                                • GetMenuItemID.USER32(?,-00000001), ref: 00A32B64
                                                • GetMenuItemID.USER32(?,?), ref: 00A32BA9
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A32BEF
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32C03
                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32C24
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                • String ID:
                                                • API String ID: 4176008265-0
                                                • Opcode ID: 1eb70771a65a32ef45f87c91478e77adc72f2954b15af727b349d1d38e6f3441
                                                • Instruction ID: af7341e76d458c8e1bddfa9b617cd538b92ed04d7ad7a4c4d52d05f957276c80
                                                • Opcode Fuzzy Hash: 1eb70771a65a32ef45f87c91478e77adc72f2954b15af727b349d1d38e6f3441
                                                • Instruction Fuzzy Hash: CF618BB0900349AFDB21CFA4D988FBEBBB8FB41344F144569F841A7251EB31AD46DB21
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A57214
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A57217
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A5723B
                                                • _memset.LIBCMT ref: 00A5724C
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A5725E
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A572D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow_memset
                                                • String ID:
                                                • API String ID: 830647256-0
                                                • Opcode ID: 42a8b3fc216a80fa03a92c3b0300e6a48f4151353b44ddcbd3bd3752af2932e4
                                                • Instruction ID: 0c303e6b3dd8a703d5b888d7c04242381c0347bbfad3cd5eb4f53b51a798eb25
                                                • Opcode Fuzzy Hash: 42a8b3fc216a80fa03a92c3b0300e6a48f4151353b44ddcbd3bd3752af2932e4
                                                • Instruction Fuzzy Hash: 38615B71A00208AFDB11DFA4DD81EEE77F8BF09710F14415AFE15AB2A1D770AA45DB60
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A27135
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00A2718E
                                                • VariantInit.OLEAUT32(?), ref: 00A271A0
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A271C0
                                                • VariantCopy.OLEAUT32(?,?), ref: 00A27213
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A27227
                                                • VariantClear.OLEAUT32(?), ref: 00A2723C
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00A27249
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A27252
                                                • VariantClear.OLEAUT32(?), ref: 00A27264
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A2726F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 86c3d60f52ad47946ea9319b197df045a9cb245567a439d8b10748cdb4a2d7e8
                                                • Instruction ID: 812d45378307502aae68b2b675e140175bd8d742506390787ba80b1b0dd1ac9d
                                                • Opcode Fuzzy Hash: 86c3d60f52ad47946ea9319b197df045a9cb245567a439d8b10748cdb4a2d7e8
                                                • Instruction Fuzzy Hash: 14412175904229EFCF00EFA8D9449EEBBB9FF48355F008075F955A7261CB30AA46CB90
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00A45AA6
                                                • inet_addr.WSOCK32(?,?,?), ref: 00A45AEB
                                                • gethostbyname.WSOCK32(?), ref: 00A45AF7
                                                • IcmpCreateFile.IPHLPAPI ref: 00A45B05
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A45B75
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A45B8B
                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00A45C00
                                                • WSACleanup.WSOCK32 ref: 00A45C06
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 5395b70ae2b50a4d86fff6df9587b04dbe55afcecd2ae6f2ce3467076ef96fff
                                                • Instruction ID: 931654ed3e5b2ecfffd8c36a23c8008bb28570057309a6c93255ff703d04051a
                                                • Opcode Fuzzy Hash: 5395b70ae2b50a4d86fff6df9587b04dbe55afcecd2ae6f2ce3467076ef96fff
                                                • Instruction Fuzzy Hash: A2516E35A447009FD711EF74CC49B2ABBE4EF88750F14892AF555DB2A2EB70E8018B41
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00A3B73B
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A3B7B1
                                                • GetLastError.KERNEL32 ref: 00A3B7BB
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00A3B828
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 3b47b780e10ff37d46db35c6a1402a88014ea01dd81e597bcf7d7272b82b0908
                                                • Instruction ID: 3f754c70abcdd586b176c40d44b707be5b441849f12e1e71f5546485156828f5
                                                • Opcode Fuzzy Hash: 3b47b780e10ff37d46db35c6a1402a88014ea01dd81e597bcf7d7272b82b0908
                                                • Instruction Fuzzy Hash: 6E31B535A41205AFDB00EF64C885BBEB7B5FF94740F10802BF602D7291DB719942CBA1
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A294F6
                                                • GetDlgCtrlID.USER32 ref: 00A29501
                                                • GetParent.USER32 ref: 00A2951D
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A29520
                                                • GetDlgCtrlID.USER32(?), ref: 00A29529
                                                • GetParent.USER32(?), ref: 00A29545
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A29548
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1536045017-1403004172
                                                • Opcode ID: 3f6f1dd93bbb9997e128b669834c74bce2138f142b6c8fc146125bfbbdbcd2b7
                                                • Instruction ID: 21698bf9b175fda4efbc8dc9902c36c0319b18d882e12025a0cf1629fd005b54
                                                • Opcode Fuzzy Hash: 3f6f1dd93bbb9997e128b669834c74bce2138f142b6c8fc146125bfbbdbcd2b7
                                                • Instruction Fuzzy Hash: 1821C470A00214BFDF05EBA8DC85EFEBBB4FF45300F104126B561972A2DB755919DB20
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A295DF
                                                • GetDlgCtrlID.USER32 ref: 00A295EA
                                                • GetParent.USER32 ref: 00A29606
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A29609
                                                • GetDlgCtrlID.USER32(?), ref: 00A29612
                                                • GetParent.USER32(?), ref: 00A2962E
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A29631
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1536045017-1403004172
                                                • Opcode ID: 67cde146cd4adf1e2469e242e7a69765e7f656d9ad3b386cfee9f81948528663
                                                • Instruction ID: 7cd3e94969c5d0cc92980dbeda65ae57abce017bc8d2371b3bb7405c9696093f
                                                • Opcode Fuzzy Hash: 67cde146cd4adf1e2469e242e7a69765e7f656d9ad3b386cfee9f81948528663
                                                • Instruction Fuzzy Hash: 4121B074A40254BFDF05EBA4DC85EFFBBB8FF48300F144026B921972A1DB7599199B20
                                                APIs
                                                • GetParent.USER32 ref: 00A29651
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00A29666
                                                • _wcscmp.LIBCMT ref: 00A29678
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A296F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1704125052-3381328864
                                                • Opcode ID: e2121bae35a6a1a06506f356c4d55997ca8918c12dce9280d970fc7eb6330f18
                                                • Instruction ID: c92413706ade4216085f22a37dc61d6ce91c1dcc02505e2c33ed15835ffbd89c
                                                • Opcode Fuzzy Hash: e2121bae35a6a1a06506f356c4d55997ca8918c12dce9280d970fc7eb6330f18
                                                • Instruction Fuzzy Hash: ED11297624832BBAFA053768FC0BEB777DCAF04B60F200036FA00A54D1FEA569114B58
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00A48BEC
                                                • CoInitialize.OLE32(00000000), ref: 00A48C19
                                                • CoUninitialize.OLE32 ref: 00A48C23
                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00A48D23
                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A48E50
                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A62C0C), ref: 00A48E84
                                                • CoGetObject.OLE32(?,00000000,00A62C0C,?), ref: 00A48EA7
                                                • SetErrorMode.KERNEL32(00000000), ref: 00A48EBA
                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A48F3A
                                                • VariantClear.OLEAUT32(?), ref: 00A48F4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                • String ID:
                                                • API String ID: 2395222682-0
                                                • Opcode ID: 1dbadbf4b0e20743b628aea962bf0b33511b62828135f66fe18deb2eee3e4688
                                                • Instruction ID: 2fa16857e034e708ccc6b7c97a0543e55b684809201876d44ecc909eb04810a5
                                                • Opcode Fuzzy Hash: 1dbadbf4b0e20743b628aea962bf0b33511b62828135f66fe18deb2eee3e4688
                                                • Instruction Fuzzy Hash: 58C12375608305AFC700EF68D884A2FB7E9BF89748F00496DF58A9B251DB35ED06CB52
                                                APIs
                                                • __swprintf.LIBCMT ref: 00A3419D
                                                • __swprintf.LIBCMT ref: 00A341AA
                                                  • Part of subcall function 009F38D8: __woutput_l.LIBCMT ref: 009F3931
                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00A341D4
                                                • LoadResource.KERNEL32(?,00000000), ref: 00A341E0
                                                • LockResource.KERNEL32(00000000), ref: 00A341ED
                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 00A3420D
                                                • LoadResource.KERNEL32(?,00000000), ref: 00A3421F
                                                • SizeofResource.KERNEL32(?,00000000), ref: 00A3422E
                                                • LockResource.KERNEL32(?), ref: 00A3423A
                                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00A3429B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                • String ID:
                                                • API String ID: 1433390588-0
                                                • Opcode ID: e2bd91456527c775ceff4bf3062fc2f08823d142fa5af6c903fc1ec4c098ef1d
                                                • Instruction ID: c64f683a9cea9d7221e06d38b2ff5856572c4f1b50f138b04d60aac712797139
                                                • Opcode Fuzzy Hash: e2bd91456527c775ceff4bf3062fc2f08823d142fa5af6c903fc1ec4c098ef1d
                                                • Instruction Fuzzy Hash: 08316DB160521AAFDB11DFE0EC48AFF7BA8FF08341F004525F915E2150E774EA528BA0
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00A31700
                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A30778,?,00000001), ref: 00A31714
                                                • GetWindowThreadProcessId.USER32(00000000), ref: 00A3171B
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30778,?,00000001), ref: 00A3172A
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A3173C
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30778,?,00000001), ref: 00A31755
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30778,?,00000001), ref: 00A31767
                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A30778,?,00000001), ref: 00A317AC
                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A30778,?,00000001), ref: 00A317C1
                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A30778,?,00000001), ref: 00A317CC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                • String ID:
                                                • API String ID: 2156557900-0
                                                • Opcode ID: 1a960e7f396eaba562b04acaf8a34309e77a42afc1ffd681e316775d0691721a
                                                • Instruction ID: a6776ce4746b6276327899556559d334d9226d2669323291f8f3d70484e8f85c
                                                • Opcode Fuzzy Hash: 1a960e7f396eaba562b04acaf8a34309e77a42afc1ffd681e316775d0691721a
                                                • Instruction Fuzzy Hash: 10318C75614304BFEB11DFA4EC88B797BA9AB55712F144026F904A62A0DB749D42CF60
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009DFC06
                                                • OleUninitialize.OLE32(?,00000000), ref: 009DFCA5
                                                • UnregisterHotKey.USER32(?), ref: 009DFDFC
                                                • DestroyWindow.USER32(?), ref: 00A14A00
                                                • FreeLibrary.KERNEL32(?), ref: 00A14A65
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A14A92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: e110b7150b34c0aa3069038f73a67847ffd7b9e62098c21a963687e74f0739b2
                                                • Instruction ID: a01987cfc55b877aa8e5040b5006e5d44466189a5e9c04343ef8b9b965e51493
                                                • Opcode Fuzzy Hash: e110b7150b34c0aa3069038f73a67847ffd7b9e62098c21a963687e74f0739b2
                                                • Instruction Fuzzy Hash: D4A16D307412128FCB29EF14C5A5B69F764BF48740F1582AEE90AAB362DB30AD56CF54
                                                APIs
                                                • EnumChildWindows.USER32(?,00A2AA64), ref: 00A2A9A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ChildEnumWindows
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                • API String ID: 3555792229-1603158881
                                                • Opcode ID: 2a6711d1d6d75f59ddb70a01d33c08489cb99d410f064980d861fde9efedd227
                                                • Instruction ID: f2875aba411c1aca86b30fb7667ec90ca4c865e859413bd20194403124b5fcc1
                                                • Opcode Fuzzy Hash: 2a6711d1d6d75f59ddb70a01d33c08489cb99d410f064980d861fde9efedd227
                                                • Instruction Fuzzy Hash: 2F91E730A0061AEBDB18EF74D481BFAFB74BF54304F148139D98AA7181DF306A99CB91
                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 009D2EAE
                                                  • Part of subcall function 009D1DB3: GetClientRect.USER32(?,?), ref: 009D1DDC
                                                  • Part of subcall function 009D1DB3: GetWindowRect.USER32(?,?), ref: 009D1E1D
                                                  • Part of subcall function 009D1DB3: ScreenToClient.USER32(?,?), ref: 009D1E45
                                                • GetDC.USER32 ref: 00A0CF82
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A0CF95
                                                • SelectObject.GDI32(00000000,00000000), ref: 00A0CFA3
                                                • SelectObject.GDI32(00000000,00000000), ref: 00A0CFB8
                                                • ReleaseDC.USER32(?,00000000), ref: 00A0CFC0
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A0D04B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: 125c63561a5933db9a594e7a62a7d8f068e503c111382bc90d16df57ee1d2e31
                                                • Instruction ID: a0a6201e46657975d8501d2d1758236798435558efdb85cadcc1fb32422af299
                                                • Opcode Fuzzy Hash: 125c63561a5933db9a594e7a62a7d8f068e503c111382bc90d16df57ee1d2e31
                                                • Instruction Fuzzy Hash: 5C71C431500209DFCF21DFA4D884AAA7BB6FF48361F14826AED565A2A6C7318C52DB61
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                  • Part of subcall function 009D2344: GetCursorPos.USER32(?), ref: 009D2357
                                                  • Part of subcall function 009D2344: ScreenToClient.USER32(00A967B0,?), ref: 009D2374
                                                  • Part of subcall function 009D2344: GetAsyncKeyState.USER32(00000001), ref: 009D2399
                                                  • Part of subcall function 009D2344: GetAsyncKeyState.USER32(00000002), ref: 009D23A7
                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00A5C2E4
                                                • ImageList_EndDrag.COMCTL32 ref: 00A5C2EA
                                                • ReleaseCapture.USER32 ref: 00A5C2F0
                                                • SetWindowTextW.USER32(?,00000000), ref: 00A5C39A
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A5C3AD
                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00A5C48F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                • API String ID: 1924731296-2107944366
                                                • Opcode ID: d628b78653b8c9cebf40112fc55e0ed5034e2bca96170a6feb39535f6574c0f6
                                                • Instruction ID: 03028a0abee241c0939cc7189b9001d26ba582eaed483eccea47345aae055f0c
                                                • Opcode Fuzzy Hash: d628b78653b8c9cebf40112fc55e0ed5034e2bca96170a6feb39535f6574c0f6
                                                • Instruction Fuzzy Hash: 9A518C70204304AFDB00EF64C895F6A7BE5FF88315F00892EF9958B2E1DB71A949CB52
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A5F910), ref: 00A4903D
                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A5F910), ref: 00A49071
                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A491EB
                                                • SysFreeString.OLEAUT32(?), ref: 00A49215
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                • String ID:
                                                • API String ID: 560350794-0
                                                • Opcode ID: 9d42816ab2ba6723d09d1bbfc8b8c9fb1eb74f6bd546d96470be76c93a13f0a4
                                                • Instruction ID: 79e8479792fda02206db71bce7b67aadeda80153463df2ccbe930a5c95e98442
                                                • Opcode Fuzzy Hash: 9d42816ab2ba6723d09d1bbfc8b8c9fb1eb74f6bd546d96470be76c93a13f0a4
                                                • Instruction Fuzzy Hash: F7F12875A00209EFDF04DF98C888EAFB7B9BF89315F108159F515AB290CB71AE56CB50
                                                APIs
                                                • _memset.LIBCMT ref: 00A4F9C9
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FB5C
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FB80
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FBC0
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FBE2
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A4FD5E
                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00A4FD90
                                                • CloseHandle.KERNEL32(?), ref: 00A4FDBF
                                                • CloseHandle.KERNEL32(?), ref: 00A4FE36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                • String ID:
                                                • API String ID: 4090791747-0
                                                • Opcode ID: 25431b45f51095236771a3a53b29a1c8ddc8fc80cf10995ab75e42bebcc63b31
                                                • Instruction ID: 5d44e98ac83f3ca13a06e39b1d2af2607237817c020c6f9b1348f4f65b2266ca
                                                • Opcode Fuzzy Hash: 25431b45f51095236771a3a53b29a1c8ddc8fc80cf10995ab75e42bebcc63b31
                                                • Instruction Fuzzy Hash: 68E19C35604341DFCB14EF24C891B6ABBE1AFC5354F14986EF8998B2A2DB31EC45CB52
                                                APIs
                                                  • Part of subcall function 00A348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A338D3,?), ref: 00A348C7
                                                  • Part of subcall function 00A348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A338D3,?), ref: 00A348E0
                                                  • Part of subcall function 00A34CD3: GetFileAttributesW.KERNEL32(?,00A33947), ref: 00A34CD4
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00A34FE2
                                                • _wcscmp.LIBCMT ref: 00A34FFC
                                                • MoveFileW.KERNEL32(?,?), ref: 00A35017
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                • String ID:
                                                • API String ID: 793581249-0
                                                • Opcode ID: 7ecbdd33ea38257f1e4bfe3e48fef7d54d8b481fd8bb1bf731c26ec8913e4364
                                                • Instruction ID: 7d9937f92805efeb5a4313547899b7a015c078ab5fd743a5556ab9a24127d82a
                                                • Opcode Fuzzy Hash: 7ecbdd33ea38257f1e4bfe3e48fef7d54d8b481fd8bb1bf731c26ec8913e4364
                                                • Instruction Fuzzy Hash: 735176B24087859BC724EBA4D881ADFB3ECAF85341F10492EB285D3151EF75A688C766
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A5896E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: dc3078cf2dc56137bb49eafad9133f140489f2d36135f17519d4bdd3d293b6ba
                                                • Instruction ID: 0eabd89bbc77a228e41d4cdf45e82c419b5f2a2d1c033e942ff5ac52f7ac71b1
                                                • Opcode Fuzzy Hash: dc3078cf2dc56137bb49eafad9133f140489f2d36135f17519d4bdd3d293b6ba
                                                • Instruction Fuzzy Hash: 5751A330600204BFDF24DF68CC85BA93BA5FF15392F604112FE11F66A1DF79A9888B81
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A0C547
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A0C569
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A0C581
                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A0C59F
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A0C5C0
                                                • DestroyIcon.USER32(00000000), ref: 00A0C5CF
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A0C5EC
                                                • DestroyIcon.USER32(?), ref: 00A0C5FB
                                                  • Part of subcall function 00A5A71E: DeleteObject.GDI32(00000000), ref: 00A5A757
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                • String ID:
                                                • API String ID: 2819616528-0
                                                • Opcode ID: 18f22e04525e8328645f496914e4398f5a2b81cf24fe9081e1f7eee7424b84a6
                                                • Instruction ID: 0795c6d189785da9c88b7f66de8c406a75347395d0eee2d37f78add19157ed1c
                                                • Opcode Fuzzy Hash: 18f22e04525e8328645f496914e4398f5a2b81cf24fe9081e1f7eee7424b84a6
                                                • Instruction Fuzzy Hash: C7518D74640209AFDB20DF64DC85FAA77B5FB58321F10862AF902972D0DB74ED81DB50
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A28A84,00000B00,?,?), ref: 00A28E0C
                                                • HeapAlloc.KERNEL32(00000000,?,00A28A84,00000B00,?,?), ref: 00A28E13
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A28A84,00000B00,?,?), ref: 00A28E28
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00A28A84,00000B00,?,?), ref: 00A28E30
                                                • DuplicateHandle.KERNEL32(00000000,?,00A28A84,00000B00,?,?), ref: 00A28E33
                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A28A84,00000B00,?,?), ref: 00A28E43
                                                • GetCurrentProcess.KERNEL32(00A28A84,00000000,?,00A28A84,00000B00,?,?), ref: 00A28E4B
                                                • DuplicateHandle.KERNEL32(00000000,?,00A28A84,00000B00,?,?), ref: 00A28E4E
                                                • CreateThread.KERNEL32(00000000,00000000,00A28E74,00000000,00000000,00000000), ref: 00A28E68
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 2ff94ea5c8e50f96f3c023a9ee400f38c8364c6b5ea42a6b29d31ea087160d4b
                                                • Instruction ID: b71ec62a8a5f85624b5e847986ca2ea029eb78495cb05ba9c014aca51ec48300
                                                • Opcode Fuzzy Hash: 2ff94ea5c8e50f96f3c023a9ee400f38c8364c6b5ea42a6b29d31ea087160d4b
                                                • Instruction Fuzzy Hash: FA01A8B5640708FFE610EBA5DC49F6B3BACFB89711F014521FB05DB1A1CA7498018A20
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$_memset
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2862541840-625585964
                                                • Opcode ID: 7c41aff72d35df2e8760971497fe257490de7aa97d247de52015b790c15f16f4
                                                • Instruction ID: 6daff56a8fd54395825398ec5cbf6d90e865f40f642e6ba9b4a45f34e7352f66
                                                • Opcode Fuzzy Hash: 7c41aff72d35df2e8760971497fe257490de7aa97d247de52015b790c15f16f4
                                                • Instruction Fuzzy Hash: BF91BB75A00219AFDF24DFA5C848FAFBBB8EF85310F10855AF519AB280D7709905CFA0
                                                APIs
                                                  • Part of subcall function 00A27652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?,?,00A2799D), ref: 00A2766F
                                                  • Part of subcall function 00A27652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?), ref: 00A2768A
                                                  • Part of subcall function 00A27652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?), ref: 00A27698
                                                  • Part of subcall function 00A27652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?), ref: 00A276A8
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00A49B1B
                                                • _memset.LIBCMT ref: 00A49B28
                                                • _memset.LIBCMT ref: 00A49C6B
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00A49C97
                                                • CoTaskMemFree.OLE32(?), ref: 00A49CA2
                                                Strings
                                                • NULL Pointer assignment, xrefs: 00A49CF0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 1300414916-2785691316
                                                • Opcode ID: 67839db04ca88d4d15163c51f6f558e96fee4c2c3d7621f6c09a6390d52266b1
                                                • Instruction ID: 9fda709ec4986c74dfcc26190242ae77e31d2b78e6bd42ffa3ae73f6927a30fd
                                                • Opcode Fuzzy Hash: 67839db04ca88d4d15163c51f6f558e96fee4c2c3d7621f6c09a6390d52266b1
                                                • Instruction Fuzzy Hash: A5913A71D00229AFDB10DFA4DC81ADEBBB8BF48310F20815AF519A7241DB315A45CFA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A57093
                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A570A7
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A570C1
                                                • _wcscat.LIBCMT ref: 00A5711C
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A57133
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A57161
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcscat
                                                • String ID: SysListView32
                                                • API String ID: 307300125-78025650
                                                • Opcode ID: 6139d73885f5e16f40dd342b82315da8fd15ea9dad5bd5b7736d0414ea00eea8
                                                • Instruction ID: d1fdc3de3d3937521d5444d0ef5c275c85ccbe923ee89177b8156c63238c17e0
                                                • Opcode Fuzzy Hash: 6139d73885f5e16f40dd342b82315da8fd15ea9dad5bd5b7736d0414ea00eea8
                                                • Instruction Fuzzy Hash: CB418E71A04308AFDB219FA4DC85BEEB7E8FF08351F10052AF945A72D2D7719D898B60
                                                APIs
                                                  • Part of subcall function 00A33E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00A33EB6
                                                  • Part of subcall function 00A33E91: Process32FirstW.KERNEL32(00000000,?), ref: 00A33EC4
                                                  • Part of subcall function 00A33E91: CloseHandle.KERNEL32(00000000), ref: 00A33F8E
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A4ECB8
                                                • GetLastError.KERNEL32 ref: 00A4ECCB
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A4ECFA
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A4ED77
                                                • GetLastError.KERNEL32(00000000), ref: 00A4ED82
                                                • CloseHandle.KERNEL32(00000000), ref: 00A4EDB7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: f74fc847ff5e11d47c69829e1057951cd28ca3829bd386b3ca6e328ed4d3fca5
                                                • Instruction ID: 1328e152ae28bc144f5f5b72e33f22d14b575a80952eab0cf8341325a6ab74da
                                                • Opcode Fuzzy Hash: f74fc847ff5e11d47c69829e1057951cd28ca3829bd386b3ca6e328ed4d3fca5
                                                • Instruction Fuzzy Hash: 9641A8716002109FDB15EF28CD95F6EB7A1BF80714F188469F9429B3D2DBB5AC04CB96
                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 00A332C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: e121db452da7171ec0fc39de359978e616c7504778cbd3e46c1efeed7495161b
                                                • Instruction ID: d2548012ffb6a80154989ef4d9db393e051f7b9ee19856f86bac52889d339fcb
                                                • Opcode Fuzzy Hash: e121db452da7171ec0fc39de359978e616c7504778cbd3e46c1efeed7495161b
                                                • Instruction Fuzzy Hash: 0D11D53370C34ABAAB016BD4DC42DEBB3ACEF39360F20002AF501A6181E6B55B4047B5
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A3454E
                                                • LoadStringW.USER32(00000000), ref: 00A34555
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A3456B
                                                • LoadStringW.USER32(00000000), ref: 00A34572
                                                • _wprintf.LIBCMT ref: 00A34598
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A345B6
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 00A34593
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 3648134473-3128320259
                                                • Opcode ID: 7651960312fab53d22babebe7a645500554d2d6dbeb95c6ec157c92b6bfc8165
                                                • Instruction ID: 2f2b012ef5b1f304c10cac9fb285eda09818e713c88f634f476244d8c5be72bc
                                                • Opcode Fuzzy Hash: 7651960312fab53d22babebe7a645500554d2d6dbeb95c6ec157c92b6bfc8165
                                                • Instruction Fuzzy Hash: 0201ECF6900308BFE751E7E49D89EEB766CEB08302F4005A5BB49D2051EA749E858B75
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • GetSystemMetrics.USER32(0000000F), ref: 00A5D78A
                                                • GetSystemMetrics.USER32(0000000F), ref: 00A5D7AA
                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A5D9E5
                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A5DA03
                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A5DA24
                                                • ShowWindow.USER32(00000003,00000000), ref: 00A5DA43
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A5DA68
                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A5DA8B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                • String ID:
                                                • API String ID: 1211466189-0
                                                • Opcode ID: ff06d095e17fb035f35c3dd820b952f5a150ed867ea01f4c5de605afe8d0ed88
                                                • Instruction ID: 510f3ff1c8c62e39eef074dbf5ff3d95dbc8e4eb89e1b404c5bc0fe448fabcec
                                                • Opcode Fuzzy Hash: ff06d095e17fb035f35c3dd820b952f5a150ed867ea01f4c5de605afe8d0ed88
                                                • Instruction Fuzzy Hash: 73B17871600225EFDF24CF69C9857BE7BB1FF48702F088069ED489B695DB34A958CB90
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A0C417,00000004,00000000,00000000,00000000), ref: 009D2ACF
                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A0C417,00000004,00000000,00000000,00000000,000000FF), ref: 009D2B17
                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A0C417,00000004,00000000,00000000,00000000), ref: 00A0C46A
                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A0C417,00000004,00000000,00000000,00000000), ref: 00A0C4D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: b681b649eb5a8f2dac7addadbe708aee308ea7f800ed1f9f6fe297d84fe2fc04
                                                • Instruction ID: 90ef27122eaa23418f50e3f9ee760d07c593268c77ebb7b9fe6973d4f2fb6559
                                                • Opcode Fuzzy Hash: b681b649eb5a8f2dac7addadbe708aee308ea7f800ed1f9f6fe297d84fe2fc04
                                                • Instruction Fuzzy Hash: D24128303487809ECB358B689CDCB7A3B96FFA6310F54C91BE0474A7E1C6799842D710
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A3737F
                                                  • Part of subcall function 009F0FF6: std::exception::exception.LIBCMT ref: 009F102C
                                                  • Part of subcall function 009F0FF6: __CxxThrowException@8.LIBCMT ref: 009F1041
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00A373B6
                                                • EnterCriticalSection.KERNEL32(?), ref: 00A373D2
                                                • _memmove.LIBCMT ref: 00A37420
                                                • _memmove.LIBCMT ref: 00A3743D
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00A3744C
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00A37461
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A37480
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 256516436-0
                                                • Opcode ID: 9475a5cb9bfeaf1228a1ed89cc6ff0379a70d7fc51b7f5ee18f44551adf7590f
                                                • Instruction ID: df93d0d5e2d91fc378a40914e8ff7ab901f89d0a7e947f0db4d7ed2ed37f88d0
                                                • Opcode Fuzzy Hash: 9475a5cb9bfeaf1228a1ed89cc6ff0379a70d7fc51b7f5ee18f44551adf7590f
                                                • Instruction Fuzzy Hash: C5318D71904209EFDF10DFA4DD85AAFBBB8FF84711F1441A5FA04AB246DB309A11CBA0
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00A5645A
                                                • GetDC.USER32(00000000), ref: 00A56462
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A5646D
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00A56479
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A564B5
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A564C6
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A59299,?,?,000000FF,00000000,?,000000FF,?), ref: 00A56500
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A56520
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: d4765ef6e99e76699c2b492e99f1d85df325862a1bd3e7079cc8c9e30e69c389
                                                • Instruction ID: 99a3406fae13d5ed894f25d086916c42dff45585e054b8e78406e7d6d01b33db
                                                • Opcode Fuzzy Hash: d4765ef6e99e76699c2b492e99f1d85df325862a1bd3e7079cc8c9e30e69c389
                                                • Instruction Fuzzy Hash: DF316972241214BFEB118F50CC8AFEB3FA9FF09762F044065FE089A2A1D6759842CB64
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: 05b552c48b1efd3753da7f6101be796e47bfb87608a7929281db3e128e820ae1
                                                • Instruction ID: 218d5ed00736b1ffe5e0261a37ceb03a8071835b50873e5cc28ae2205f3640a5
                                                • Opcode Fuzzy Hash: 05b552c48b1efd3753da7f6101be796e47bfb87608a7929281db3e128e820ae1
                                                • Instruction Fuzzy Hash: 2F21C571644629F7D214A629AD42FBF336CAF607B9B040030FE05962C2E752DD2183E5
                                                APIs
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                  • Part of subcall function 009EFEC6: _wcscpy.LIBCMT ref: 009EFEE9
                                                • _wcstok.LIBCMT ref: 00A3EEFF
                                                • _wcscpy.LIBCMT ref: 00A3EF8E
                                                • _memset.LIBCMT ref: 00A3EFC1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                • String ID: X
                                                • API String ID: 774024439-3081909835
                                                • Opcode ID: 208301cc39336552afab8dbc3901ed3ecf064ee806e5f30a2f6eb112f0eb1cdb
                                                • Instruction ID: 2b002829c355b8e558b5beb70da4b9ed7cdb64793b326287b28f7937d4ae994c
                                                • Opcode Fuzzy Hash: 208301cc39336552afab8dbc3901ed3ecf064ee806e5f30a2f6eb112f0eb1cdb
                                                • Instruction Fuzzy Hash: 05C170315487009FC724EF28C981B6AB7E4BF85310F04892EF999973A2DB70ED45CB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e9c6463f5f5451808c2c92ba89e31a40af1f4dd04a472907d213a68cc7e2ac3b
                                                • Instruction ID: b92071e573d49416a72647803e184f5a9bce3aade930048b764370e7295b4960
                                                • Opcode Fuzzy Hash: e9c6463f5f5451808c2c92ba89e31a40af1f4dd04a472907d213a68cc7e2ac3b
                                                • Instruction Fuzzy Hash: 0C715831940109FFCB04DF98DD89AAEBB79FF85314F14C15AF915AB2A1C734AA51CBA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1bb6ae3662aee9a8d474b015ebaaeaec2f805fdca21bceff91be85040af66af1
                                                • Instruction ID: e65e32a4da626e12aa2de30b9b9380d3de935ab0795a852107d17f71b3d3b490
                                                • Opcode Fuzzy Hash: 1bb6ae3662aee9a8d474b015ebaaeaec2f805fdca21bceff91be85040af66af1
                                                • Instruction Fuzzy Hash: 3F61AA76108310AFC710EB24CC82F6FB7E9AFC4714F508A1AF556972A2DB70AD05CB92
                                                APIs
                                                • IsWindow.USER32(01395B30), ref: 00A5B6A5
                                                • IsWindowEnabled.USER32(01395B30), ref: 00A5B6B1
                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00A5B795
                                                • SendMessageW.USER32(01395B30,000000B0,?,?), ref: 00A5B7CC
                                                • IsDlgButtonChecked.USER32(?,?), ref: 00A5B809
                                                • GetWindowLongW.USER32(01395B30,000000EC), ref: 00A5B82B
                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A5B843
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                • String ID:
                                                • API String ID: 4072528602-0
                                                • Opcode ID: 71e2ed381bd86780fef1d731dcf2801376a16519b7d6de4d0665c5b881502405
                                                • Instruction ID: e4b6fa56a6689b292c3ad9166d3365e1847ec4718d7c55bdbd3f8edd78c718cf
                                                • Opcode Fuzzy Hash: 71e2ed381bd86780fef1d731dcf2801376a16519b7d6de4d0665c5b881502405
                                                • Instruction Fuzzy Hash: A4718B74611204AFDB20DFA4C8A4FAABBB9FF89343F144069FD45972A1C731A949CB60
                                                APIs
                                                • _memset.LIBCMT ref: 00A4F75C
                                                • _memset.LIBCMT ref: 00A4F825
                                                • ShellExecuteExW.SHELL32(?), ref: 00A4F86A
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                  • Part of subcall function 009EFEC6: _wcscpy.LIBCMT ref: 009EFEE9
                                                • GetProcessId.KERNEL32(00000000), ref: 00A4F8E1
                                                • CloseHandle.KERNEL32(00000000), ref: 00A4F910
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                • String ID: @
                                                • API String ID: 3522835683-2766056989
                                                • Opcode ID: 47f8e8b7cb1fe8133d4597e385ab3d44cfa748132674375db8c054135ef48dc6
                                                • Instruction ID: 397f51ae4b25bf0bee6cbb5fe508dce829192cad49cbec351a9a0ea32c76c39e
                                                • Opcode Fuzzy Hash: 47f8e8b7cb1fe8133d4597e385ab3d44cfa748132674375db8c054135ef48dc6
                                                • Instruction Fuzzy Hash: 8061A179A00619DFCF14EF64C590AAEBBF5FF88310F14946AE856AB351CB30AD41CB90
                                                APIs
                                                • GetParent.USER32(?), ref: 00A3149C
                                                • GetKeyboardState.USER32(?), ref: 00A314B1
                                                • SetKeyboardState.USER32(?), ref: 00A31512
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A31540
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A3155F
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A315A5
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A315C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 4e0a4e892b4e7868713fc632f731793e332bd5bb0827c9af3fbf87859c35521c
                                                • Instruction ID: 0830a947f74f332afaf499a98fdf97e3d02b6af63fc11b0a60f3c0e32c51400b
                                                • Opcode Fuzzy Hash: 4e0a4e892b4e7868713fc632f731793e332bd5bb0827c9af3fbf87859c35521c
                                                • Instruction Fuzzy Hash: 1D5102A0A047D53EFB3243748C46BBABEA96B46304F0C8489F1D6468C2D7E9ECD4D760
                                                APIs
                                                • GetParent.USER32(00000000), ref: 00A312B5
                                                • GetKeyboardState.USER32(?), ref: 00A312CA
                                                • SetKeyboardState.USER32(?), ref: 00A3132B
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A31357
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A31374
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A313B8
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A313D9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: d5d2a62aee2db215ada78966cfcc9ae9252445c3cfbc0c9232a63cc51c65f8f4
                                                • Instruction ID: 226ff464368029938105d0a975ead22237dcd1677c5127e31707e1099bdd454b
                                                • Opcode Fuzzy Hash: d5d2a62aee2db215ada78966cfcc9ae9252445c3cfbc0c9232a63cc51c65f8f4
                                                • Instruction Fuzzy Hash: 9F51E3A0A047D53DFB3287648C45BBABFA96F06300F088989F1D54ACC2D795EC98D760
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _wcsncpy$LocalTime
                                                • String ID:
                                                • API String ID: 2945705084-0
                                                • Opcode ID: 8edaacb7eefa7543aa75efe855eec2c9ee2600bb1d5618a42250f551c64034cf
                                                • Instruction ID: b428f85eb586218c44a1f1548b210ede6fbdf760f6389ce6ca65daef4a4be1fc
                                                • Opcode Fuzzy Hash: 8edaacb7eefa7543aa75efe855eec2c9ee2600bb1d5618a42250f551c64034cf
                                                • Instruction Fuzzy Hash: 9B4192A5C2161C76CB10FBB88C8ABDFB7A89F44310F608566F618E3121E734E715C7A9
                                                APIs
                                                  • Part of subcall function 00A348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A338D3,?), ref: 00A348C7
                                                  • Part of subcall function 00A348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A338D3,?), ref: 00A348E0
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00A338F3
                                                • _wcscmp.LIBCMT ref: 00A3390F
                                                • MoveFileW.KERNEL32(?,?), ref: 00A33927
                                                • _wcscat.LIBCMT ref: 00A3396F
                                                • SHFileOperationW.SHELL32(?), ref: 00A339DB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 1377345388-1173974218
                                                • Opcode ID: 827619b8d87f7ec667d4c187d8ec7d1f274d789ac6c132ac0cf3757000c0cdd0
                                                • Instruction ID: 2c7b1b90536b79d5b7a5acee9dd4f4480cd2b33c7da8b19d06c45f80d621c9f4
                                                • Opcode Fuzzy Hash: 827619b8d87f7ec667d4c187d8ec7d1f274d789ac6c132ac0cf3757000c0cdd0
                                                • Instruction Fuzzy Hash: A6419FB250C3849ECB51EF64D491AEFB7E8EF89350F10192EB48AC3251EB74D688C752
                                                APIs
                                                • _memset.LIBCMT ref: 00A57519
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A575C0
                                                • IsMenu.USER32(?), ref: 00A575D8
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A57620
                                                • DrawMenuBar.USER32 ref: 00A57633
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                • String ID: 0
                                                • API String ID: 3866635326-4108050209
                                                • Opcode ID: 60a8c7a484b8a0f0e746e2f6a6953a97c709abe76fb2497e8bf9d1dc2966b561
                                                • Instruction ID: 17c513d7792877c9ab1f29b99827cb8c933dff5dece5f242f535ccfb11e505d4
                                                • Opcode Fuzzy Hash: 60a8c7a484b8a0f0e746e2f6a6953a97c709abe76fb2497e8bf9d1dc2966b561
                                                • Instruction Fuzzy Hash: 5F412675A04649AFDB20DF94E884EAABBF8FF08351F048129ED15A7650DB30AD55CFA0
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A5125C
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A51286
                                                • FreeLibrary.KERNEL32(00000000), ref: 00A5133D
                                                  • Part of subcall function 00A5122D: RegCloseKey.ADVAPI32(?), ref: 00A512A3
                                                  • Part of subcall function 00A5122D: FreeLibrary.KERNEL32(?), ref: 00A512F5
                                                  • Part of subcall function 00A5122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A51318
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A512E0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                • String ID:
                                                • API String ID: 395352322-0
                                                • Opcode ID: bc476453105d8202e485e94e77911643d758c75d8a9697565679e2365a92057f
                                                • Instruction ID: a8fd556ab9666b4909561331879a1cdf2dd6e257fe41727d4e60b65dd54aabf2
                                                • Opcode Fuzzy Hash: bc476453105d8202e485e94e77911643d758c75d8a9697565679e2365a92057f
                                                • Instruction Fuzzy Hash: 72310AB1901219BFDB15DBD0DC99EFFB7BCFB08312F000169E911E6151EA749E899AA0
                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A5655B
                                                • GetWindowLongW.USER32(01395B30,000000F0), ref: 00A5658E
                                                • GetWindowLongW.USER32(01395B30,000000F0), ref: 00A565C3
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A565F5
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A5661F
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00A56630
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00A5664A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: 3926fe6fa5cfb11a897ad32948277876b3dd743f30e31dacb26d6bf02f64bda8
                                                • Instruction ID: 9b9391aade05f8e0afd9c166b0c20a0162d05600ce6d4fbc1c6a13297589618a
                                                • Opcode Fuzzy Hash: 3926fe6fa5cfb11a897ad32948277876b3dd743f30e31dacb26d6bf02f64bda8
                                                • Instruction Fuzzy Hash: 57312430644250AFDB20CF98DC84F553BE1FB5A352F9841A9F9018B6B5DB71AC49DB41
                                                APIs
                                                  • Part of subcall function 00A480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A480CB
                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A464D9
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A464E8
                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A46521
                                                • connect.WSOCK32(00000000,?,00000010), ref: 00A4652A
                                                • WSAGetLastError.WSOCK32 ref: 00A46534
                                                • closesocket.WSOCK32(00000000), ref: 00A4655D
                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A46576
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                • String ID:
                                                • API String ID: 910771015-0
                                                • Opcode ID: 31324852e8b7f35662e434db09cde18c0d3b2a8103417760ba31ab7bc5a90dfb
                                                • Instruction ID: aecf209928a2a224e920e285225f987cc5d8da90ed3a939c044d99ac16831479
                                                • Opcode Fuzzy Hash: 31324852e8b7f35662e434db09cde18c0d3b2a8103417760ba31ab7bc5a90dfb
                                                • Instruction Fuzzy Hash: 2931B135600218AFDF10EF64DD85BBE7BBCEB85711F048029F90997291DB74AD05CBA2
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E0FA
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E120
                                                • SysAllocString.OLEAUT32(00000000), ref: 00A2E123
                                                • SysAllocString.OLEAUT32 ref: 00A2E144
                                                • SysFreeString.OLEAUT32 ref: 00A2E14D
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00A2E167
                                                • SysAllocString.OLEAUT32(?), ref: 00A2E175
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: fe002da72b1bb40e95513daa4ae4c46d6f95c2b218dacbee20f76d7425bc2e0c
                                                • Instruction ID: 2c43c90ee0cb976bc30d662573a3dd9180ef2aa55833b229d1a8381ccb9f7097
                                                • Opcode Fuzzy Hash: fe002da72b1bb40e95513daa4ae4c46d6f95c2b218dacbee20f76d7425bc2e0c
                                                • Instruction Fuzzy Hash: D6213235605218AFDB10DFACDC88DAB77ACFB19760B108235F915CB2A1DA70DC828B64
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 1038674560-2734436370
                                                • Opcode ID: 1567eb20d9475ea251e8b5a56c4bf9396daf98809c93b86a6e37c17f2533a465
                                                • Instruction ID: bdd94561c82a95a7d7d686d5b6f93a83b6096b31306b4ac676a891ccd5357800
                                                • Opcode Fuzzy Hash: 1567eb20d9475ea251e8b5a56c4bf9396daf98809c93b86a6e37c17f2533a465
                                                • Instruction Fuzzy Hash: 0C213772104565BED631A728EE12FB7B3B8EF91340F148436FD8687181EB51AD81D791
                                                APIs
                                                  • Part of subcall function 009D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D1D73
                                                  • Part of subcall function 009D1D35: GetStockObject.GDI32(00000011), ref: 009D1D87
                                                  • Part of subcall function 009D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D1D91
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A578A1
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A578AE
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A578B9
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A578C8
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A578D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: 318ecdd304517f6368bbfcc3445ae55e74b5c478458469a4f00615cf7cd002e7
                                                • Instruction ID: 5b676a5f68ffe0a0d4e1c1c410b4f450e44cbb0ce6a992b00cfa4218422f78d9
                                                • Opcode Fuzzy Hash: 318ecdd304517f6368bbfcc3445ae55e74b5c478458469a4f00615cf7cd002e7
                                                • Instruction Fuzzy Hash: 5B1160B2550219BFEF159FA0CC85EEB7F6DFF08768F014115BA04A6090CB72AC61DBA4
                                                APIs
                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,009F4292,?), ref: 009F41E3
                                                • GetProcAddress.KERNEL32(00000000), ref: 009F41EA
                                                • EncodePointer.KERNEL32(00000000), ref: 009F41F6
                                                • DecodePointer.KERNEL32(00000001,009F4292,?), ref: 009F4213
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                • String ID: RoInitialize$combase.dll
                                                • API String ID: 3489934621-340411864
                                                • Opcode ID: 4e32315a316c631c2d85143dbe572c683ba30bb7e2e8570339d1e33ede0b9aed
                                                • Instruction ID: 461f17a022459760d56ba0518407151fc9cf98ac4a76e423574ff5f15397d62b
                                                • Opcode Fuzzy Hash: 4e32315a316c631c2d85143dbe572c683ba30bb7e2e8570339d1e33ede0b9aed
                                                • Instruction Fuzzy Hash: 7AE0EDB0690B00AEEB10ABF0EC09F5536E4B724743F204925B521D50A0DAB540938B00
                                                APIs
                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,009F41B8), ref: 009F42B8
                                                • GetProcAddress.KERNEL32(00000000), ref: 009F42BF
                                                • EncodePointer.KERNEL32(00000000), ref: 009F42CA
                                                • DecodePointer.KERNEL32(009F41B8), ref: 009F42E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                • String ID: RoUninitialize$combase.dll
                                                • API String ID: 3489934621-2819208100
                                                • Opcode ID: 5b0aee64e40af6f7955747a311014bb850d97f9dac4edb5a1522419e8ab1cbde
                                                • Instruction ID: 39f792ba5185ffd0b771b91ce39533c8437afd7199d770018fb39476af4dcab5
                                                • Opcode Fuzzy Hash: 5b0aee64e40af6f7955747a311014bb850d97f9dac4edb5a1522419e8ab1cbde
                                                • Instruction Fuzzy Hash: 47E09A78641700EFEA10DBA0EC09F563AA4B718746F204526F115D50B0CF744543CB14
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove$__itow__swprintf
                                                • String ID:
                                                • API String ID: 3253778849-0
                                                • Opcode ID: 1347be9f1f4028bf595c74e1ca37d754460415366fd3933d447e99c3041e9c04
                                                • Instruction ID: 340252ffd68b694fb6495bd8aeea99972bf1684cbee35b1f4edcfa4a6d88c84b
                                                • Opcode Fuzzy Hash: 1347be9f1f4028bf595c74e1ca37d754460415366fd3933d447e99c3041e9c04
                                                • Instruction Fuzzy Hash: B761BF3054065AABCF11FF64CC92FFE77A8AF84308F04851AF9595B292DB349D51CB90
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A50038,?,?), ref: 00A510BC
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50548
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A50588
                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A505AB
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A505D4
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A50617
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A50624
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                • String ID:
                                                • API String ID: 4046560759-0
                                                • Opcode ID: c8191fa5a7325f6b9b1112331b20d5e3d46d4bd0e77ff12c6fae52297620e922
                                                • Instruction ID: 2679017af591ad94bb7634992ae16ba6db2988b67125ffc82d70e4b8e17b3b48
                                                • Opcode Fuzzy Hash: c8191fa5a7325f6b9b1112331b20d5e3d46d4bd0e77ff12c6fae52297620e922
                                                • Instruction Fuzzy Hash: 1B513931108200AFCB14EF64C885E6EBBF8FF84355F04892EF945972A1EB71E909CB52
                                                APIs
                                                • GetMenu.USER32(?), ref: 00A55A82
                                                • GetMenuItemCount.USER32(00000000), ref: 00A55AB9
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A55AE1
                                                • GetMenuItemID.USER32(?,?), ref: 00A55B50
                                                • GetSubMenu.USER32(?,?), ref: 00A55B5E
                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00A55BAF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountMessagePostString
                                                • String ID:
                                                • API String ID: 650687236-0
                                                • Opcode ID: 8bd605e1ced5a3b059d6168e4ec0d9f780083a25db028f1e4b04f5dd4c6efeab
                                                • Instruction ID: 59ec25aecb2f11925dc8752937b1f00b572a8c956f690e2d401174755d27c9c2
                                                • Opcode Fuzzy Hash: 8bd605e1ced5a3b059d6168e4ec0d9f780083a25db028f1e4b04f5dd4c6efeab
                                                • Instruction Fuzzy Hash: 42515935E00619EFCF15EFA4C959AAEB7B4FF48321F11446AED01AB351DB30AE458B90
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00A2F3F7
                                                • VariantClear.OLEAUT32(00000013), ref: 00A2F469
                                                • VariantClear.OLEAUT32(00000000), ref: 00A2F4C4
                                                • _memmove.LIBCMT ref: 00A2F4EE
                                                • VariantClear.OLEAUT32(?), ref: 00A2F53B
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A2F569
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                • String ID:
                                                • API String ID: 1101466143-0
                                                • Opcode ID: f68342505f4d1b55df57d733994c44fa37be25d27417e82a11d2734ae462f7b4
                                                • Instruction ID: bb3c8653e7517ca974ef3b45c7977142ff674289453c88dda46517daeecdc947
                                                • Opcode Fuzzy Hash: f68342505f4d1b55df57d733994c44fa37be25d27417e82a11d2734ae462f7b4
                                                • Instruction Fuzzy Hash: 0A5148B5A00219EFCB14DF58D884AAAB7B8FF4C354B15856AED59DB310D730E912CFA0
                                                APIs
                                                • _memset.LIBCMT ref: 00A32747
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32792
                                                • IsMenu.USER32(00000000), ref: 00A327B2
                                                • CreatePopupMenu.USER32 ref: 00A327E6
                                                • GetMenuItemCount.USER32(000000FF), ref: 00A32844
                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00A32875
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                • String ID:
                                                • API String ID: 3311875123-0
                                                • Opcode ID: 3b75f78c6fb5c24fa223020242f847c4b76e67f116b626553209786bc59181fd
                                                • Instruction ID: 2de2a8f3691208d8792e2d09df2f5e59041e5565a32b150628e4862256005f29
                                                • Opcode Fuzzy Hash: 3b75f78c6fb5c24fa223020242f847c4b76e67f116b626553209786bc59181fd
                                                • Instruction Fuzzy Hash: C151BE70A0030AEFDF25CFA8D988BAEBBF5BF44314F104269F8119B291E7709945CB51
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 009D179A
                                                • GetWindowRect.USER32(?,?), ref: 009D17FE
                                                • ScreenToClient.USER32(?,?), ref: 009D181B
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009D182C
                                                • EndPaint.USER32(?,?), ref: 009D1876
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                • String ID:
                                                • API String ID: 1827037458-0
                                                • Opcode ID: 5c723b2d85eae802d38f07169cb66ed701e108e06e2fdcca4dd99b1fc5ca6112
                                                • Instruction ID: f4de796c8189407513190579ebc87bbbef4383a68994d3772bd7b4e5c056a143
                                                • Opcode Fuzzy Hash: 5c723b2d85eae802d38f07169cb66ed701e108e06e2fdcca4dd99b1fc5ca6112
                                                • Instruction Fuzzy Hash: A741AF71204300AFDB10DF65DC84FBA7BE8FF49764F04862AF994872A1CB319846DB61
                                                APIs
                                                • ShowWindow.USER32(00A967B0,00000000,01395B30,?,?,00A967B0,?,00A5B862,?,?), ref: 00A5B9CC
                                                • EnableWindow.USER32(00000000,00000000), ref: 00A5B9F0
                                                • ShowWindow.USER32(00A967B0,00000000,01395B30,?,?,00A967B0,?,00A5B862,?,?), ref: 00A5BA50
                                                • ShowWindow.USER32(00000000,00000004,?,00A5B862,?,?), ref: 00A5BA62
                                                • EnableWindow.USER32(00000000,00000001), ref: 00A5BA86
                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00A5BAA9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: e763c9317ffe9fdff7f782d75a811c04445ac9f921cb874c508ac016aebf0b4c
                                                • Instruction ID: acfb86ef0fd0b1154f1e3cee6e00368dd649bdb2a8e7a4d1ee4af1ef7e78f064
                                                • Opcode Fuzzy Hash: e763c9317ffe9fdff7f782d75a811c04445ac9f921cb874c508ac016aebf0b4c
                                                • Instruction Fuzzy Hash: B3413034610241EFDB26CF54C889B957BE1BB05357F1842B9FE488F6A2C731A84ACB61
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00A45134,?,?,00000000,00000001), ref: 00A473BF
                                                  • Part of subcall function 00A43C94: GetWindowRect.USER32(?,?), ref: 00A43CA7
                                                • GetDesktopWindow.USER32 ref: 00A473E9
                                                • GetWindowRect.USER32(00000000), ref: 00A473F0
                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00A47422
                                                  • Part of subcall function 00A354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A3555E
                                                • GetCursorPos.USER32(?), ref: 00A4744E
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A474AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                • String ID:
                                                • API String ID: 4137160315-0
                                                • Opcode ID: 823ff04aba545336dfcdf0fca2f1e24ad556ee2e2a9a02dfa15c590d52d25df2
                                                • Instruction ID: bbe6ab096ada4e6e701e50b58bdc0723f06f204f3f965f0ea767bf670dc666bf
                                                • Opcode Fuzzy Hash: 823ff04aba545336dfcdf0fca2f1e24ad556ee2e2a9a02dfa15c590d52d25df2
                                                • Instruction Fuzzy Hash: A631B272508355AFD720DF64D849EAFBBA9FF88314F000919F58997191DB30EA09CB92
                                                APIs
                                                  • Part of subcall function 00A285F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A28608
                                                  • Part of subcall function 00A285F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A28612
                                                  • Part of subcall function 00A285F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A28621
                                                  • Part of subcall function 00A285F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A28628
                                                  • Part of subcall function 00A285F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A2863E
                                                • GetLengthSid.ADVAPI32(?,00000000,00A28977), ref: 00A28DAC
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A28DB8
                                                • HeapAlloc.KERNEL32(00000000), ref: 00A28DBF
                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A28DD8
                                                • GetProcessHeap.KERNEL32(00000000,00000000,00A28977), ref: 00A28DEC
                                                • HeapFree.KERNEL32(00000000), ref: 00A28DF3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                • String ID:
                                                • API String ID: 3008561057-0
                                                • Opcode ID: efc8cdb8e4a2460532c3b63439341f64c85be56cd49dbc4a81a2c139469604d0
                                                • Instruction ID: 1c523543a5c56ffa8829948e81971df6f2e716183d5069a5ef3b9635d0e435e4
                                                • Opcode Fuzzy Hash: efc8cdb8e4a2460532c3b63439341f64c85be56cd49dbc4a81a2c139469604d0
                                                • Instruction Fuzzy Hash: 9F11EE31502614FFDB10DFA8EC08BAE7BB9FF55316F108129F84593290DB3AA909CB60
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A28B2A
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00A28B31
                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A28B40
                                                • CloseHandle.KERNEL32(00000004), ref: 00A28B4B
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A28B7A
                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A28B8E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 1413079979-0
                                                • Opcode ID: 81e56da8cd176fd104192ae6966d8e9c2b6d07b33eb948acd59e4a41897b06cb
                                                • Instruction ID: b289395f2c52037dec218817ead180cebd969b34feb95257cb2eb1207dc8d52c
                                                • Opcode Fuzzy Hash: 81e56da8cd176fd104192ae6966d8e9c2b6d07b33eb948acd59e4a41897b06cb
                                                • Instruction Fuzzy Hash: 301159B2501209AFDF01CFA8ED49FDE7BA9FF08305F044068FE04A2160C7768D61AB60
                                                APIs
                                                  • Part of subcall function 009D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D134D
                                                  • Part of subcall function 009D12F3: SelectObject.GDI32(?,00000000), ref: 009D135C
                                                  • Part of subcall function 009D12F3: BeginPath.GDI32(?), ref: 009D1373
                                                  • Part of subcall function 009D12F3: SelectObject.GDI32(?,00000000), ref: 009D139C
                                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00A5C1C4
                                                • LineTo.GDI32(00000000,00000003,?), ref: 00A5C1D8
                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A5C1E6
                                                • LineTo.GDI32(00000000,00000000,?), ref: 00A5C1F6
                                                • EndPath.GDI32(00000000), ref: 00A5C206
                                                • StrokePath.GDI32(00000000), ref: 00A5C216
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: 78ac9d65a3b3964d13974dc055db90fc4f17b064a7f30846c6032c46788f0d96
                                                • Instruction ID: 87493f7cbc6e8ce0e789403010459026dbd13ddb277cec27691f526f59dfacfc
                                                • Opcode Fuzzy Hash: 78ac9d65a3b3964d13974dc055db90fc4f17b064a7f30846c6032c46788f0d96
                                                • Instruction Fuzzy Hash: 05110C7644020CBFDF119F90DC48EDA7FADFF04355F048021BA18461A1D7729D55DBA0
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F03D3
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 009F03DB
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F03E6
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F03F1
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 009F03F9
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 009F0401
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: 913dd780ce9bdb3fc932f8c950304dd1a3373417c5238868851a7f235614866f
                                                • Instruction ID: c665734fc5d1d9266cb1f4d147d39db99c7c548a61cf66ec6f1855878e00a7d8
                                                • Opcode Fuzzy Hash: 913dd780ce9bdb3fc932f8c950304dd1a3373417c5238868851a7f235614866f
                                                • Instruction Fuzzy Hash: 1F016CB09017597DE3009F5A8C85B52FFE8FF19354F00411BA15C47941C7F5A864CBE5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A3569B
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A356B1
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00A356C0
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A356CF
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A356D9
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A356E0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 98b93d3ce01b305c300408dddfd7e1134fcd474a420f5b84d8db88f62d46ee9f
                                                • Instruction ID: 0c2980e47271477e6ef76c54311425016d8cc0b1cd15eb7e291470cfffe0a510
                                                • Opcode Fuzzy Hash: 98b93d3ce01b305c300408dddfd7e1134fcd474a420f5b84d8db88f62d46ee9f
                                                • Instruction Fuzzy Hash: A9F01231541658BFE7219BA29C0DEAB7B7CFBC6B12F000169FA04D105197B11A0286B5
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,?), ref: 00A374E5
                                                • EnterCriticalSection.KERNEL32(?,?,009E1044,?,?), ref: 00A374F6
                                                • TerminateThread.KERNEL32(00000000,000001F6,?,009E1044,?,?), ref: 00A37503
                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,009E1044,?,?), ref: 00A37510
                                                  • Part of subcall function 00A36ED7: CloseHandle.KERNEL32(00000000,?,00A3751D,?,009E1044,?,?), ref: 00A36EE1
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A37523
                                                • LeaveCriticalSection.KERNEL32(?,?,009E1044,?,?), ref: 00A3752A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: 38268a4f0eb72154eab1d97d618c02e6cd870da2ae3820c4498f137d7059650b
                                                • Instruction ID: 3daba37dab6defb0233a43035a92ba05479dba82d82429ee7f9d25b671128a01
                                                • Opcode Fuzzy Hash: 38268a4f0eb72154eab1d97d618c02e6cd870da2ae3820c4498f137d7059650b
                                                • Instruction Fuzzy Hash: DAF03ABA141712AFEB116BA4ED8CAEF772ABF45703F100531F202914A0CF755802CA50
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A28E7F
                                                • UnloadUserProfile.USERENV(?,?), ref: 00A28E8B
                                                • CloseHandle.KERNEL32(?), ref: 00A28E94
                                                • CloseHandle.KERNEL32(?), ref: 00A28E9C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00A28EA5
                                                • HeapFree.KERNEL32(00000000), ref: 00A28EAC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: f10b7e62c6a59b5d9d57c5a1e5ae145dee614cf9f5a66455c72500a3b632583e
                                                • Instruction ID: ade756fdbdf3b52204d88d74317fc3ee1f2504931c667ebd794b092dadf4eb9b
                                                • Opcode Fuzzy Hash: f10b7e62c6a59b5d9d57c5a1e5ae145dee614cf9f5a66455c72500a3b632583e
                                                • Instruction Fuzzy Hash: C2E0C236004601FFDA01AFE1EC0C90ABB69FB99323B108230F32985470CB32A422DB50
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00A48928
                                                • CharUpperBuffW.USER32(?,?), ref: 00A48A37
                                                • VariantClear.OLEAUT32(?), ref: 00A48BAF
                                                  • Part of subcall function 00A37804: VariantInit.OLEAUT32(00000000), ref: 00A37844
                                                  • Part of subcall function 00A37804: VariantCopy.OLEAUT32(00000000,?), ref: 00A3784D
                                                  • Part of subcall function 00A37804: VariantClear.OLEAUT32(00000000), ref: 00A37859
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4237274167-1221869570
                                                • Opcode ID: 138ae03a9b3fc9cb6d34f71612b6b4570cdd2e6afec580d6f1dc8a33e80aacf5
                                                • Instruction ID: a745919ed839136c16d5f3af5bed565853dacb539cae6c29479f4d8e356f8b66
                                                • Opcode Fuzzy Hash: 138ae03a9b3fc9cb6d34f71612b6b4570cdd2e6afec580d6f1dc8a33e80aacf5
                                                • Instruction Fuzzy Hash: DF915B756047019FC710EF28D58095EBBE4EFC9354F04896EF89A8B362DB30E946CB52
                                                APIs
                                                  • Part of subcall function 009EFEC6: _wcscpy.LIBCMT ref: 009EFEE9
                                                • _memset.LIBCMT ref: 00A33077
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A330A6
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A33159
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A33187
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                • String ID: 0
                                                • API String ID: 4152858687-4108050209
                                                • Opcode ID: 6c5a1f6b312384601dac1edd53eae7f1ccb8a871782de634f3c06616b4bba66f
                                                • Instruction ID: 9dbedbd4eba0975e500c389cd9de26f8fe281856be0a112008eb9403ecef2a1e
                                                • Opcode Fuzzy Hash: 6c5a1f6b312384601dac1edd53eae7f1ccb8a871782de634f3c06616b4bba66f
                                                • Instruction Fuzzy Hash: 4951807261C300ABDF259F28D845B6BBBE4EF85360F044A2EF995D7291DB70CE448792
                                                APIs
                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A2DAC5
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A2DAFB
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A2DB0C
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A2DB8E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: add7e3a82ba53264af42d66a0e4babacf8bbe8db18ac65dbe512bc62a669bf68
                                                • Instruction ID: c4cd1902d79b31cae7e38c3da2df200b5d014ee157628d5ec1df61348448deae
                                                • Opcode Fuzzy Hash: add7e3a82ba53264af42d66a0e4babacf8bbe8db18ac65dbe512bc62a669bf68
                                                • Instruction Fuzzy Hash: 51419FB1600218EFDB15CF68D984A9ABBB9FF44350F1581BAAD05DF246D7B1DD40CBA0
                                                APIs
                                                • _memset.LIBCMT ref: 00A32CAF
                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A32CCB
                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00A32D11
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00A96890,00000000), ref: 00A32D5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem_memset
                                                • String ID: 0
                                                • API String ID: 1173514356-4108050209
                                                • Opcode ID: 654f399ba6a81eaf5d6c6c4e4f5d6879853f304925414853b43e403604500533
                                                • Instruction ID: 707ad327f6b75c34ceb7e5a1ea4cd764f06a60d587d55851980b9a0571e32945
                                                • Opcode Fuzzy Hash: 654f399ba6a81eaf5d6c6c4e4f5d6879853f304925414853b43e403604500533
                                                • Instruction Fuzzy Hash: 5441AF30204302AFD720DF24D885B5BBBE8FF85360F14466EF965972A1DB70E905CBA2
                                                APIs
                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A4DAD9
                                                  • Part of subcall function 009D79AB: _memmove.LIBCMT ref: 009D79F9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharLower_memmove
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 3425801089-567219261
                                                • Opcode ID: eb5bb29982c224f7d0e4d355479ae19827de96cc3a1890380c3afc746415979c
                                                • Instruction ID: ce851cf21ccf3d834a9117a13d7c103d148327ef371a17edf4b62c9cfa0b7ff2
                                                • Opcode Fuzzy Hash: eb5bb29982c224f7d0e4d355479ae19827de96cc3a1890380c3afc746415979c
                                                • Instruction Fuzzy Hash: 9331887550061A9FCF10EF94CC81AFEB7B4FF85710B10862AE865A77D1DB71A906CB90
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A293F6
                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A29409
                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A29439
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$_memmove$ClassName
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 365058703-1403004172
                                                • Opcode ID: 2ce9c1107f0c934e22e64900501b8baf96be11492b81056775d3f823f2ee7671
                                                • Instruction ID: 8ebd4f62066da6bc1e6eece94bca2aad79e0aeaeee1dafa0794257788d8c22a6
                                                • Opcode Fuzzy Hash: 2ce9c1107f0c934e22e64900501b8baf96be11492b81056775d3f823f2ee7671
                                                • Instruction Fuzzy Hash: 1921F371940118BFDB14ABB8EC85DFFB7BCEF45760F14812AF925972E1DB350A0A9620
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A41B40
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A41B66
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A41B96
                                                • InternetCloseHandle.WININET(00000000), ref: 00A41BDD
                                                  • Part of subcall function 00A42777: GetLastError.KERNEL32(?,?,00A41B0B,00000000,00000000,00000001), ref: 00A4278C
                                                  • Part of subcall function 00A42777: SetEvent.KERNEL32(?,?,00A41B0B,00000000,00000000,00000001), ref: 00A427A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: 4b2de043633cb25a9032bbee97923328ba5f0e971d6f9d90c5ac5326d2551b37
                                                • Instruction ID: 315436fbdeac689afacc0bc6467dd0a198601759baddb5a2e364bdf925d14213
                                                • Opcode Fuzzy Hash: 4b2de043633cb25a9032bbee97923328ba5f0e971d6f9d90c5ac5326d2551b37
                                                • Instruction Fuzzy Hash: AF218BB9600308BFEB119F609D85EBB76ECEB89748F10452AF505A6240EB349D469761
                                                APIs
                                                  • Part of subcall function 009D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D1D73
                                                  • Part of subcall function 009D1D35: GetStockObject.GDI32(00000011), ref: 009D1D87
                                                  • Part of subcall function 009D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D1D91
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A566D0
                                                • LoadLibraryW.KERNEL32(?), ref: 00A566D7
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A566EC
                                                • DestroyWindow.USER32(?), ref: 00A566F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                • String ID: SysAnimate32
                                                • API String ID: 4146253029-1011021900
                                                • Opcode ID: a1c806e90866f60947f30dcac726efbf583389f2e5c8fb7e8e08a8e4fb44acb0
                                                • Instruction ID: 5c01333ce88986525a0d7f2eb881cbbc071795eaf72ca4b6a1256da51cf3d4a2
                                                • Opcode Fuzzy Hash: a1c806e90866f60947f30dcac726efbf583389f2e5c8fb7e8e08a8e4fb44acb0
                                                • Instruction Fuzzy Hash: 3321BB71200206BFEF108FA4EC80EAB77ADFB5932AF904629FD1093190D771CC459B60
                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00A3705E
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A37091
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00A370A3
                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00A370DD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: b29392eec9ee8145b9d63a2b8f885b8b35c24d469724e3c3c7f7382e3d72760a
                                                • Instruction ID: 5dfc5cefd97854ff68f5ad46617a8b8440447641c9e50629fcf77055a461e0dd
                                                • Opcode Fuzzy Hash: b29392eec9ee8145b9d63a2b8f885b8b35c24d469724e3c3c7f7382e3d72760a
                                                • Instruction Fuzzy Hash: A4215EB4504309AFDB349F68DC05A9E77B8BF56721F208A29FDA1D72D0E77098518B50
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00A3712B
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A3715D
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00A3716E
                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00A371A8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: 1d32999c47c60f9b83f6220dca9a88200ac074a796af59ed3fe6f155613b07aa
                                                • Instruction ID: 41cfb2c0b1ecb493d34e383afb9fe74dc515a5fa6a55d300c060d3afbd5d914f
                                                • Opcode Fuzzy Hash: 1d32999c47c60f9b83f6220dca9a88200ac074a796af59ed3fe6f155613b07aa
                                                • Instruction Fuzzy Hash: 6B2141B6504319ABDB309F689C04A9EB7E8BF55720F204B19FDA1D72E0DB7098418B51
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00A3AEBF
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A3AF13
                                                • __swprintf.LIBCMT ref: 00A3AF2C
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A5F910), ref: 00A3AF6A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                • String ID: %lu
                                                • API String ID: 3164766367-685833217
                                                • Opcode ID: c7ffae2a428969591aaf7df21ce630929d3d78dfc92606b8f0f8361c6819d56f
                                                • Instruction ID: dae23ad8975fc55c74b621d69e1643dd4441bb689267554a1c96edf5311c2725
                                                • Opcode Fuzzy Hash: c7ffae2a428969591aaf7df21ce630929d3d78dfc92606b8f0f8361c6819d56f
                                                • Instruction Fuzzy Hash: BD214430A40209AFDB10EF64D985EAE77B8FF89704B10806AF909DB351DB71EA45CB61
                                                APIs
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                  • Part of subcall function 00A2A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A2A399
                                                  • Part of subcall function 00A2A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2A3AC
                                                  • Part of subcall function 00A2A37C: GetCurrentThreadId.KERNEL32 ref: 00A2A3B3
                                                  • Part of subcall function 00A2A37C: AttachThreadInput.USER32(00000000), ref: 00A2A3BA
                                                • GetFocus.USER32 ref: 00A2A554
                                                  • Part of subcall function 00A2A3C5: GetParent.USER32(?), ref: 00A2A3D3
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A2A59D
                                                • EnumChildWindows.USER32(?,00A2A615), ref: 00A2A5C5
                                                • __swprintf.LIBCMT ref: 00A2A5DF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                • String ID: %s%d
                                                • API String ID: 1941087503-1110647743
                                                • Opcode ID: 05273bbfd13496dc4e727158320ee931357dc0cea74b83620f128de55e985eba
                                                • Instruction ID: 159a9a89e7f4d0eb21cbeb7f3adb54a60f7c673675a5e5959a679b4b107f02cf
                                                • Opcode Fuzzy Hash: 05273bbfd13496dc4e727158320ee931357dc0cea74b83620f128de55e985eba
                                                • Instruction Fuzzy Hash: 4B11DF71200218BBDF10BFA8EC85FEA7779AF98300F0440B6F908AA192DB7059468B31
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00A32048
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                • API String ID: 3964851224-769500911
                                                • Opcode ID: 51bd2568823d8c1395a581debe0a0ff9abf7f601b5d776e9ccf16763b8a5faf6
                                                • Instruction ID: d491da069d887811df386e3629a819313c4e04340b29a359fe8d872157c2296e
                                                • Opcode Fuzzy Hash: 51bd2568823d8c1395a581debe0a0ff9abf7f601b5d776e9ccf16763b8a5faf6
                                                • Instruction Fuzzy Hash: FA115B309402098FCF14EFA4D8916FEB7B4FF66304F108569E955A72A2EB326D0ACB50
                                                APIs
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A4EF1B
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A4EF4B
                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00A4F07E
                                                • CloseHandle.KERNEL32(?), ref: 00A4F0FF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                • String ID:
                                                • API String ID: 2364364464-0
                                                • Opcode ID: de26de6a43ee02e6e85b3a04520355aa365538db31885b7245db3feb75438779
                                                • Instruction ID: be5e07abe233afbdf6caa3ca9596427a033eda62985fe14b334a2f6722d51dc4
                                                • Opcode Fuzzy Hash: de26de6a43ee02e6e85b3a04520355aa365538db31885b7245db3feb75438779
                                                • Instruction Fuzzy Hash: E7815175644311AFD720EF28C946F2AB7E5AFC8720F14881EF59ADB392DB70AC418B51
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A50038,?,?), ref: 00A510BC
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50388
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A503C7
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A5040E
                                                • RegCloseKey.ADVAPI32(?,?), ref: 00A5043A
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A50447
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                • String ID:
                                                • API String ID: 3440857362-0
                                                • Opcode ID: 86953662639ac6385c7877af3bb332c939d6c5e1d9469f66cd477d95ad50a932
                                                • Instruction ID: 1cd87975a9e610c9748819e34387ad6b070135855e8e18caf50256057434bc65
                                                • Opcode Fuzzy Hash: 86953662639ac6385c7877af3bb332c939d6c5e1d9469f66cd477d95ad50a932
                                                • Instruction Fuzzy Hash: DC513B31208205AFD704EF64D881F6EB7F8FF84315F44892EB9958B291DB31E909CB52
                                                APIs
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00A4DC3B
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00A4DCBE
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00A4DCDA
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00A4DD1B
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00A4DD35
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A37B20,?,?,00000000), ref: 009D5B8C
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A37B20,?,?,00000000,?,?), ref: 009D5BB0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                • String ID:
                                                • API String ID: 327935632-0
                                                • Opcode ID: f3c3c1d0caeeb07b226de2a22929d97f3b974307e38f4b619d478913e4c1468f
                                                • Instruction ID: b3fc7dfc1885eca8b393881a59d3c8062acd7aeaa2c0d54c2e9a2aeabb471276
                                                • Opcode Fuzzy Hash: f3c3c1d0caeeb07b226de2a22929d97f3b974307e38f4b619d478913e4c1468f
                                                • Instruction Fuzzy Hash: E2511879A40605DFCB00EFA8C484EADB7F4FF99310B15C06AE959AB321DB34AD45CB91
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A3E88A
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00A3E8B3
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A3E8F2
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A3E917
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A3E91F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                • String ID:
                                                • API String ID: 1389676194-0
                                                • Opcode ID: 0888f9df609900a8015516b8969e78b75464ddbc8cae79ad7323eb8aef0e925d
                                                • Instruction ID: 7d70af7396eda78a0addd3f370e2d3498887980049d91cba029110cc8850e523
                                                • Opcode Fuzzy Hash: 0888f9df609900a8015516b8969e78b75464ddbc8cae79ad7323eb8aef0e925d
                                                • Instruction Fuzzy Hash: B5510975A00215EFCB01EF64C981AAEBBF5EF48314B1480A9F849AB361CB31AD51DB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cc57bc44403cc1e3cc366651db059668608632e5724d20ba212a4c39760d52a3
                                                • Instruction ID: 31513ce700bfa2e2923095f703a3d017a7759615c433700dd1b866a7e07fb68a
                                                • Opcode Fuzzy Hash: cc57bc44403cc1e3cc366651db059668608632e5724d20ba212a4c39760d52a3
                                                • Instruction Fuzzy Hash: 7C41D339B00204AFC710DB68CC48FA9BBB4FB29366F144265FC56AB2E1D770AE45DA51
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 009D2357
                                                • ScreenToClient.USER32(00A967B0,?), ref: 009D2374
                                                • GetAsyncKeyState.USER32(00000001), ref: 009D2399
                                                • GetAsyncKeyState.USER32(00000002), ref: 009D23A7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: 64fd1d65e9e12f389e04ed136f2ec945d36451ca0c0bae406dd33052c59321be
                                                • Instruction ID: 038247143dd23ffe6f6d5d0fd73fb282224a803d497420ada4a74d15006c3235
                                                • Opcode Fuzzy Hash: 64fd1d65e9e12f389e04ed136f2ec945d36451ca0c0bae406dd33052c59321be
                                                • Instruction Fuzzy Hash: A1419E31904219FBCF159FA8D844AE9FB74FB19770F20835AF828962E0C7349994DB91
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A2695D
                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00A269A9
                                                • TranslateMessage.USER32(?), ref: 00A269D2
                                                • DispatchMessageW.USER32(?), ref: 00A269DC
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A269EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                • String ID:
                                                • API String ID: 2108273632-0
                                                • Opcode ID: c1a6a0a0a61896694e940d8c7a9717f729234601062eedf0977fedbe5a30507e
                                                • Instruction ID: 59cf89845cd99ba2649cb66b08a90fdc3b55e307cfb6b56be5dabfdbe1ebb3c8
                                                • Opcode Fuzzy Hash: c1a6a0a0a61896694e940d8c7a9717f729234601062eedf0977fedbe5a30507e
                                                • Instruction Fuzzy Hash: 2D31A371A02266AEDB20CFB8AC84BB67BBCAF01344F144576E421D71A1DF359886D790
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00A28F12
                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00A28FBC
                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A28FC4
                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00A28FD2
                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A28FDA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: b11e65e545f12c8384fbb3ad443a23a24e3d0a1e4f7dc03b869be1fc0a3cc09e
                                                • Instruction ID: 107ec18cb38c24ae6d00e990263b45a5c8e64ad8b25b00018485e406451f1934
                                                • Opcode Fuzzy Hash: b11e65e545f12c8384fbb3ad443a23a24e3d0a1e4f7dc03b869be1fc0a3cc09e
                                                • Instruction Fuzzy Hash: FF31CE71501229EFDB14CFACEA4CA9E7BB6FB04316F108229F925EB1D0C7B49914DB90
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00A2B6C7
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A2B6E4
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A2B71C
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A2B742
                                                • _wcsstr.LIBCMT ref: 00A2B74C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                • String ID:
                                                • API String ID: 3902887630-0
                                                • Opcode ID: 19db07f8a6257f1035a8b0ffe0381554ce0b8f3711c1d5901ae1b2f0b6ade59f
                                                • Instruction ID: 4b2056f0ce7d95b71a03c1a5a942bfe64d524632ef9eaaea9fb2a23d7536b1ef
                                                • Opcode Fuzzy Hash: 19db07f8a6257f1035a8b0ffe0381554ce0b8f3711c1d5901ae1b2f0b6ade59f
                                                • Instruction Fuzzy Hash: 78210432605254BBEB259B79AC49E7B7BACEF89721F104039FD05CA1A1EF71DC4193A0
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A5B44C
                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A5B471
                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A5B489
                                                • GetSystemMetrics.USER32(00000004), ref: 00A5B4B2
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00A41184,00000000), ref: 00A5B4D0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Long$MetricsSystem
                                                • String ID:
                                                • API String ID: 2294984445-0
                                                • Opcode ID: 9c5539eb6f04a60d43af59ecf4089319c646b12959d00ee568957c4a183356e8
                                                • Instruction ID: af681f8de6b07da97157d982f2a363e9b87d920e41467666c082d7547d0420dc
                                                • Opcode Fuzzy Hash: 9c5539eb6f04a60d43af59ecf4089319c646b12959d00ee568957c4a183356e8
                                                • Instruction Fuzzy Hash: A8219171620255AFCB209F788C44A6A37B4FB05723F118739FD26C71E2E7309815DBA0
                                                APIs
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A29802
                                                  • Part of subcall function 009D7D2C: _memmove.LIBCMT ref: 009D7D66
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A29834
                                                • __itow.LIBCMT ref: 00A2984C
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A29874
                                                • __itow.LIBCMT ref: 00A29885
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow$_memmove
                                                • String ID:
                                                • API String ID: 2983881199-0
                                                • Opcode ID: e86e70ee651c49d3e0155a063195e445d2b35e60c600488bf4f60af0a9bcd189
                                                • Instruction ID: d94dc48c4ad6dfc373daa29d003966fb3f3c75617a23379b7e571157141926fc
                                                • Opcode Fuzzy Hash: e86e70ee651c49d3e0155a063195e445d2b35e60c600488bf4f60af0a9bcd189
                                                • Instruction Fuzzy Hash: 0321C571B00258BFDB10ABB99C86EEF7BA9EF4AB10F084035FD04DB291E6709D458791
                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D134D
                                                • SelectObject.GDI32(?,00000000), ref: 009D135C
                                                • BeginPath.GDI32(?), ref: 009D1373
                                                • SelectObject.GDI32(?,00000000), ref: 009D139C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 2f68a24d10afd5152d872e3119556ffe7ea1435cb33d316c293d59d7cfb456d6
                                                • Instruction ID: 7295593f7b49b966a7aa19b0af524c6581b9f914cfcc8b3267890c862487f821
                                                • Opcode Fuzzy Hash: 2f68a24d10afd5152d872e3119556ffe7ea1435cb33d316c293d59d7cfb456d6
                                                • Instruction Fuzzy Hash: BA213E71940308EFDB11DFA5EC047A9BBB8FF10362F14C227F810962A0DB719996DB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: b3c70ccba4bbbbdae1e9b5a6e613558d57df2827b56c35a7fb56d2547697054b
                                                • Instruction ID: 45156c555be503ec0660e49405c55fe79d74ba9d67b45e52fff6d2ccff1aee41
                                                • Opcode Fuzzy Hash: b3c70ccba4bbbbdae1e9b5a6e613558d57df2827b56c35a7fb56d2547697054b
                                                • Instruction Fuzzy Hash: 4A0175B1604529BBE204A6296C43FBFB76CAF613B8F444635FE04D6283E651DF2183E1
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00A34D5C
                                                • __beginthreadex.LIBCMT ref: 00A34D7A
                                                • MessageBoxW.USER32(?,?,?,?), ref: 00A34D8F
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A34DA5
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A34DAC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                • String ID:
                                                • API String ID: 3824534824-0
                                                • Opcode ID: 6245b28b3802183512077efedca17aaf8bd9a788f420367fef5983fe5a419a51
                                                • Instruction ID: 632d68e00835809d8fda1b8aae84aa887148acc891b85f98d0fbb8ac77a0177f
                                                • Opcode Fuzzy Hash: 6245b28b3802183512077efedca17aaf8bd9a788f420367fef5983fe5a419a51
                                                • Instruction Fuzzy Hash: 3611E1B2E04248BFC701DBF89C08AEB7BACFB49321F144366FA14D3260DA718D0187A0
                                                APIs
                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28766
                                                • GetLastError.KERNEL32(?,00A2822A,?,?,?), ref: 00A28770
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00A2822A,?,?,?), ref: 00A2877F
                                                • HeapAlloc.KERNEL32(00000000,?,00A2822A,?,?,?), ref: 00A28786
                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A2879D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 842720411-0
                                                • Opcode ID: 381fd5fb5b694fca5e1f550278070631eb5ec6864c42732dd940fc73972aa80c
                                                • Instruction ID: eecc337eb12da05a56c3351c8c98e74b758c4627fdb66fd61c92242874653a75
                                                • Opcode Fuzzy Hash: 381fd5fb5b694fca5e1f550278070631eb5ec6864c42732dd940fc73972aa80c
                                                • Instruction Fuzzy Hash: 88014B71202214EFDB248FAAEC88D6B7BACFF893567200579F949C3260DA318C11CA60
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A35502
                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A35510
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A35518
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A35522
                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A3555E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: cbdd6efa6a774228306ee2a2a1180f33f149ac44dd9173af498165a0ebdc3ae3
                                                • Instruction ID: 016d4dbb5545528edb239af9d45d2a72c8fb738b2f93783a6ede7126da41b0f4
                                                • Opcode Fuzzy Hash: cbdd6efa6a774228306ee2a2a1180f33f149ac44dd9173af498165a0ebdc3ae3
                                                • Instruction Fuzzy Hash: C9011736D01A29DBCF00EFF9E888AEDBB79BB09712F010556E906B2140DB31A655C7A1
                                                APIs
                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?,?,00A2799D), ref: 00A2766F
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?), ref: 00A2768A
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?), ref: 00A27698
                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?), ref: 00A276A8
                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A2758C,80070057,?,?), ref: 00A276B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: 3d5e658ba8f1b8c5d86f4d8e845f707ca6e86915912172f624c6740cdf7b2b00
                                                • Instruction ID: 8c6c6df166700b996bd60cc3868b74047e82f0ca7d9ec1981596128508b12320
                                                • Opcode Fuzzy Hash: 3d5e658ba8f1b8c5d86f4d8e845f707ca6e86915912172f624c6740cdf7b2b00
                                                • Instruction Fuzzy Hash: D3017172601724AFDB119F5DEC44AAE7BAEFB44752F140038FD04D2211E731DE4297A0
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A28608
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A28612
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A28621
                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A28628
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A2863E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: aa034e17ddfa23833c0d7a1d8f60f64405715810b09f8470a7bf99924bbf19f7
                                                • Instruction ID: 524aeabca267bd8512767e2a0e254647da0ee01100d7982dce971e651b8f5d34
                                                • Opcode Fuzzy Hash: aa034e17ddfa23833c0d7a1d8f60f64405715810b09f8470a7bf99924bbf19f7
                                                • Instruction Fuzzy Hash: C3F04F35202315AFEB204FE9EC8DE6B3BACFF89B55B040535F945C6190EB759C42DA60
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A28669
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A28673
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28682
                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28689
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A2869F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: 6e2f3c6d208081cb0649eb2de3738aeceaee01c7520a21b32ef7071eee6bfdba
                                                • Instruction ID: 75883ddfe1503fe18d29643ec0d214e4edf6e7a873e9599190d88e549a372c15
                                                • Opcode Fuzzy Hash: 6e2f3c6d208081cb0649eb2de3738aeceaee01c7520a21b32ef7071eee6bfdba
                                                • Instruction Fuzzy Hash: ABF0AF70202314AFEB115FA8EC88E6B3BADFF89756B140035F905C6190DA709802EA60
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00A2C6BA
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A2C6D1
                                                • MessageBeep.USER32(00000000), ref: 00A2C6E9
                                                • KillTimer.USER32(?,0000040A), ref: 00A2C705
                                                • EndDialog.USER32(?,00000001), ref: 00A2C71F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: d9cae0458e3b59379f4056bd7987598ac49b9badb321bcda7672e0957b7d844f
                                                • Instruction ID: 9e3fec4d1e14bc0c0ecc1be07abe4301af8caff6a191b41f55879b2f971e4437
                                                • Opcode Fuzzy Hash: d9cae0458e3b59379f4056bd7987598ac49b9badb321bcda7672e0957b7d844f
                                                • Instruction Fuzzy Hash: F2018630500714ABEB21AB64ED5EF9A77B8FF04716F000679F542A18E1EBF0A9558F81
                                                APIs
                                                • EndPath.GDI32(?), ref: 009D13BF
                                                • StrokeAndFillPath.GDI32(?,?,00A0BAD8,00000000,?), ref: 009D13DB
                                                • SelectObject.GDI32(?,00000000), ref: 009D13EE
                                                • DeleteObject.GDI32 ref: 009D1401
                                                • StrokePath.GDI32(?), ref: 009D141C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: e8ccdb6aaf4e5f6627494cb5c0b27e07219be2cc00698a8a747e42eb687cd96d
                                                • Instruction ID: 554a77d470ad01cc95adaff868d6f372f15a6076ff6483daaa9ecda609fd6d8a
                                                • Opcode Fuzzy Hash: e8ccdb6aaf4e5f6627494cb5c0b27e07219be2cc00698a8a747e42eb687cd96d
                                                • Instruction Fuzzy Hash: 02F0C431144708EFDB15DFA6EC0C7587BA8BB01326F08C226E429851F1DB358997DF50
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00A3C69D
                                                • CoCreateInstance.OLE32(00A62D6C,00000000,00000001,00A62BDC,?), ref: 00A3C6B5
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                • CoUninitialize.OLE32 ref: 00A3C922
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                • String ID: .lnk
                                                • API String ID: 2683427295-24824748
                                                • Opcode ID: 70cfc958a3b9fb78082f940de7802c60b458923d3708fc559c010494c3882836
                                                • Instruction ID: ed722f155360d101c91b958644cacf4cc38423ae340566dbe1cdf4cf695ed9af
                                                • Opcode Fuzzy Hash: 70cfc958a3b9fb78082f940de7802c60b458923d3708fc559c010494c3882836
                                                • Instruction Fuzzy Hash: C4A12A71148205AFD700EF64C881FABB7E8FF94754F00896DF156972A2EB70EA49CB52
                                                APIs
                                                  • Part of subcall function 009F0FF6: std::exception::exception.LIBCMT ref: 009F102C
                                                  • Part of subcall function 009F0FF6: __CxxThrowException@8.LIBCMT ref: 009F1041
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 009D7BB1: _memmove.LIBCMT ref: 009D7C0B
                                                • __swprintf.LIBCMT ref: 009E302D
                                                Strings
                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 009E2EC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                • API String ID: 1943609520-557222456
                                                • Opcode ID: 72f94d8d3850f5ce027e1df0ea72791d000a8f3054ec97022bcd1fda7b8d45e7
                                                • Instruction ID: de342bc58813c4691d26ee464dd9c31876877fe5db6b4fbdd4d8e3972b9b9370
                                                • Opcode Fuzzy Hash: 72f94d8d3850f5ce027e1df0ea72791d000a8f3054ec97022bcd1fda7b8d45e7
                                                • Instruction Fuzzy Hash: BD918F71108745AFC719EF24D885E6EB7B8EF85740F04891EF486972A1EB30EE45CB52
                                                APIs
                                                  • Part of subcall function 009D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009D48A1,?,?,009D37C0,?), ref: 009D48CE
                                                • CoInitialize.OLE32(00000000), ref: 00A3BC26
                                                • CoCreateInstance.OLE32(00A62D6C,00000000,00000001,00A62BDC,?), ref: 00A3BC3F
                                                • CoUninitialize.OLE32 ref: 00A3BC5C
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                • String ID: .lnk
                                                • API String ID: 2126378814-24824748
                                                • Opcode ID: 7051a04f832fdc32e4c334eb74f307a02622ce222dd675cac621d31b15bc9cbe
                                                • Instruction ID: 316ec0feb9b6563a206b3b60106c8ce27449ef44aea5f507c02195a57e570593
                                                • Opcode Fuzzy Hash: 7051a04f832fdc32e4c334eb74f307a02622ce222dd675cac621d31b15bc9cbe
                                                • Instruction Fuzzy Hash: 6CA15775604301AFCB10EF18C494E5ABBE6FF88314F148999F9999B3A1CB31ED45CB91
                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 009F52DD
                                                  • Part of subcall function 00A00340: __87except.LIBCMT ref: 00A0037B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__87except__start
                                                • String ID: pow
                                                • API String ID: 2905807303-2276729525
                                                • Opcode ID: 6b3c5b5b9c415b776e9602c43e5c21c6aca8b856245acd8dc7abbbc1f16897e1
                                                • Instruction ID: c797055f5a5c735ae9215c555832487719f918411ea81f53bee10552e751e93f
                                                • Opcode Fuzzy Hash: 6b3c5b5b9c415b776e9602c43e5c21c6aca8b856245acd8dc7abbbc1f16897e1
                                                • Instruction Fuzzy Hash: 70519E21E1CA0DC7CB11B718E901B7E2BA89B00350F218E59E3D5861E9EFB58CD5DB46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #$+
                                                • API String ID: 0-2552117581
                                                • Opcode ID: 0ee403f478e2817ff15cf4858daf0dfdc50838c824e3e8e84b757da06b1762fe
                                                • Instruction ID: f7251952cb059d11640c1604012147fd48c83c74f3306626acaead20b74ca5a3
                                                • Opcode Fuzzy Hash: 0ee403f478e2817ff15cf4858daf0dfdc50838c824e3e8e84b757da06b1762fe
                                                • Instruction Fuzzy Hash: D851213590426A8FDF15DF7CE8886FA7BA8FF99310F144066EC919B2A1D7349C42C760
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memset$_memmove
                                                • String ID: ERCP
                                                • API String ID: 2532777613-1384759551
                                                • Opcode ID: 475d3f78cb4098043a286e8448b6de0e6b8c8bd27dd5b37a8545f224aa468388
                                                • Instruction ID: fa5c6ce68f84d8b3b125abc5c91e1abff6fb495f1d32808cc364bef69953c047
                                                • Opcode Fuzzy Hash: 475d3f78cb4098043a286e8448b6de0e6b8c8bd27dd5b37a8545f224aa468388
                                                • Instruction Fuzzy Hash: 2651E271900359DBCB25CF66C8807AABBF8EF14354F20856EE64AC7291F770E990CB50
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A5F910,00000000,?,?,?,?), ref: 00A57C4E
                                                • GetWindowLongW.USER32 ref: 00A57C6B
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A57C7B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: c75f7b8486dbf8b52c53fba5e480d4892f5b3f769d97965e7b46d002f41fe1f7
                                                • Instruction ID: a58992d20120a66ff7eb377b9c8f201622dcc8d645e7ae1b18fb3c88cf6c6589
                                                • Opcode Fuzzy Hash: c75f7b8486dbf8b52c53fba5e480d4892f5b3f769d97965e7b46d002f41fe1f7
                                                • Instruction Fuzzy Hash: 3131CD31244206AEDB118F78EC45BEA77A9FF45325F204725FC76A32E0D731E8558B60
                                                APIs
                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A576D0
                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A576E4
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A57708
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: SysMonthCal32
                                                • API String ID: 2326795674-1439706946
                                                • Opcode ID: 608c792fb9a576ecb2376b6d6ae0eda437db8e3c58b75f387540f5f64efb1c28
                                                • Instruction ID: f76b98d9f17d668ab0aa86c42131b8a9c1b79cd8ed00d6e43586e49dd9323839
                                                • Opcode Fuzzy Hash: 608c792fb9a576ecb2376b6d6ae0eda437db8e3c58b75f387540f5f64efb1c28
                                                • Instruction Fuzzy Hash: 98218B32610219BBDF11CFA4DC46FEE3BA9FB48725F110214FE15BB1D0DAB1A8559BA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A56FAA
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A56FBA
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A56FDF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: a47661a13e48012a2f096d30a731335e883129ffcb7804764a3c47a56d80b1f2
                                                • Instruction ID: 74262652782e331c59911524e74ffc1123304c3482317cd457858cb76e0ece6e
                                                • Opcode Fuzzy Hash: a47661a13e48012a2f096d30a731335e883129ffcb7804764a3c47a56d80b1f2
                                                • Instruction Fuzzy Hash: B421A732A10118BFDF118F54DC85FAB37BAFF89755F418124F9149B190C671AC59CBA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A579E1
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A579F6
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A57A03
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: 612d4d17232d8149dbc7c1196dd2f226aa54be28bdaf38d822fb732fdd19c586
                                                • Instruction ID: e06b6170175f9c604e7fa12143c2af932246064242ce5d45a67930288583b427
                                                • Opcode Fuzzy Hash: 612d4d17232d8149dbc7c1196dd2f226aa54be28bdaf38d822fb732fdd19c586
                                                • Instruction Fuzzy Hash: 0911E332254208BEEF109FB0DC05FAF3BA9FF89B65F014519FB41A6090D771A811CB60
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,009D4C2E), ref: 009D4CA3
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009D4CB5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                • API String ID: 2574300362-192647395
                                                • Opcode ID: 03b93d470c7eb58645235f0c84ba28f986531f08d5a13695861e33c311213a86
                                                • Instruction ID: a5903a6a19ce5b1978a8f99fd2e08519a0eb0375befb5ff4a89afc73eea249e5
                                                • Opcode Fuzzy Hash: 03b93d470c7eb58645235f0c84ba28f986531f08d5a13695861e33c311213a86
                                                • Instruction Fuzzy Hash: 6CD01770560B23DFDB209F71DA18A4676E9BF05792B12CC3A98C6D6250E670D880CA51
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,009D4CE1,?), ref: 009D4DA2
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009D4DB4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-1355242751
                                                • Opcode ID: 49388042e4f9998acc51f914d2b20e1ad6d33d9ac0e424b50fcb7bc99990bf98
                                                • Instruction ID: e7d54f8848ef9e32901d57c25811f1d331c8c66a3f16e3aabefd5be0fd2cf655
                                                • Opcode Fuzzy Hash: 49388042e4f9998acc51f914d2b20e1ad6d33d9ac0e424b50fcb7bc99990bf98
                                                • Instruction Fuzzy Hash: EBD01771590B13DFDB20AF71D808A4A76E9BF05356B21CC3AD8D6DA290E770E880CA50
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,009D4D2E,?,009D4F4F,?,00A962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009D4D6F
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009D4D81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-3689287502
                                                • Opcode ID: cbf0f2c3ae87d6f1818aeb20c3de395fee96d661ad2cad66f9c08cbf1eabab97
                                                • Instruction ID: f196720a1ab2207c4230e0f97eadc62eb5aca56a5e6d4fc9f3d096faa0b352c6
                                                • Opcode Fuzzy Hash: cbf0f2c3ae87d6f1818aeb20c3de395fee96d661ad2cad66f9c08cbf1eabab97
                                                • Instruction Fuzzy Hash: CCD01770950B13DFDB20AF71D80861676E9BF15352B21CD3A9896D6290E670E880CA61
                                                APIs
                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00A512C1), ref: 00A51080
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A51092
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2574300362-4033151799
                                                • Opcode ID: 1009bb19b317561d51b2eb879d3d50d26a22f58808f8637178980fb50da17740
                                                • Instruction ID: a75bfefc597c138a1a60cf40c81c64843f8c5669471787925609903e5cbf87e1
                                                • Opcode Fuzzy Hash: 1009bb19b317561d51b2eb879d3d50d26a22f58808f8637178980fb50da17740
                                                • Instruction Fuzzy Hash: B8D01270510712DFD720AF75D85866676E4BF05392B118D3AA8C5D7190F770C8C0C750
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00A49009,?,00A5F910), ref: 00A49403
                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A49415
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                • API String ID: 2574300362-199464113
                                                • Opcode ID: f4a0c5bc2e09d80888f8dcda551c444f4e6cb16e480eca513133104bd0029e21
                                                • Instruction ID: b7e91b4ad0c8fac6c97e55f2d2cf0cc9726514f201662802a5e6ce8674405701
                                                • Opcode Fuzzy Hash: f4a0c5bc2e09d80888f8dcda551c444f4e6cb16e480eca513133104bd0029e21
                                                • Instruction Fuzzy Hash: E6D0C778540B13DFDB20AFB1CA0D60372E4BF00342B01CC3AA882C2550EB70C880CB50
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LocalTime__swprintf
                                                • String ID: %.3d$WIN_XPe
                                                • API String ID: 2070861257-2409531811
                                                • Opcode ID: c11aaa3c5a26b4987148dfc6424633df874b3545a6a6fefe80aee557466aa453
                                                • Instruction ID: 461fbb1b090fd9df34679f191d31b720ec69521e2cb6026319eff3dc68b9c2c7
                                                • Opcode Fuzzy Hash: c11aaa3c5a26b4987148dfc6424633df874b3545a6a6fefe80aee557466aa453
                                                • Instruction Fuzzy Hash: 13D017B1C0C21CEACB04AA909C849FA737CBB18301F544993FA06E2500F3389BD5EB25
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3eadc96a763d98b37edd15d9bc82aed21c8e28d3dbb68b6aafb23ce54cfedae8
                                                • Instruction ID: aec7b56a4021bbf8ba282cb955432deb12a75e53bc12c95b9bc52d35c7237c3c
                                                • Opcode Fuzzy Hash: 3eadc96a763d98b37edd15d9bc82aed21c8e28d3dbb68b6aafb23ce54cfedae8
                                                • Instruction Fuzzy Hash: CAC16175A04226EFCB14CF98D884EAEB7F5FF48714B1585A9E805EB251D730EE81CB90
                                                APIs
                                                • CharLowerBuffW.USER32(?,?), ref: 00A4E3D2
                                                • CharLowerBuffW.USER32(?,?), ref: 00A4E415
                                                  • Part of subcall function 00A4DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A4DAD9
                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00A4E615
                                                • _memmove.LIBCMT ref: 00A4E628
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                • String ID:
                                                • API String ID: 3659485706-0
                                                • Opcode ID: 13ec8113a40d677ac8d8416ca66384cd2bfee675614e28a3cd9eaa041b7365c3
                                                • Instruction ID: f9537bff8a162eb605ee33fd74b288f331e3999f750fe8ed647bbdca9b771d99
                                                • Opcode Fuzzy Hash: 13ec8113a40d677ac8d8416ca66384cd2bfee675614e28a3cd9eaa041b7365c3
                                                • Instruction Fuzzy Hash: 54C149756083119FC714DF28C480A6ABBF4FF88714F14896EF99A9B351D731E946CB82
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00A483D8
                                                • CoUninitialize.OLE32 ref: 00A483E3
                                                  • Part of subcall function 00A2DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A2DAC5
                                                • VariantInit.OLEAUT32(?), ref: 00A483EE
                                                • VariantClear.OLEAUT32(?), ref: 00A486BF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                • String ID:
                                                • API String ID: 780911581-0
                                                • Opcode ID: d930338f018bbd8ee90c290190c8cf9e8fdb627b9198e5792e7548fba5b7c647
                                                • Instruction ID: f622d5bef77f8bcbebd5b0809de7f1d71387cbf6907238ec60acdad044cf29bd
                                                • Opcode Fuzzy Hash: d930338f018bbd8ee90c290190c8cf9e8fdb627b9198e5792e7548fba5b7c647
                                                • Instruction Fuzzy Hash: CCA12A792447119FCB10EF18D891B2EB7E4BF88314F158459F99A9B3A1CB34ED44CB46
                                                APIs
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A62C7C,?), ref: 00A27C32
                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A62C7C,?), ref: 00A27C4A
                                                • CLSIDFromProgID.OLE32(?,?,00000000,00A5FB80,000000FF,?,00000000,00000800,00000000,?,00A62C7C,?), ref: 00A27C6F
                                                • _memcmp.LIBCMT ref: 00A27C90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: 043be23c861a603623294dfba0af33a3c75ee48f8128314b60399e5038e7f816
                                                • Instruction ID: 1cada8d2d5bd4ca6a21e8cff176d994022385c00b4b66905b9906c5b259c1734
                                                • Opcode Fuzzy Hash: 043be23c861a603623294dfba0af33a3c75ee48f8128314b60399e5038e7f816
                                                • Instruction Fuzzy Hash: 07810D71A00119EFCB04DF98D984EEEB7B9FF89315F2045A9F506AB250DB71AE05CB60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyInitString
                                                • String ID:
                                                • API String ID: 2808897238-0
                                                • Opcode ID: 1d44ac88b03a552206ecbbf9c7254cf5136006cd4a5bef0de58766e3e4aead2f
                                                • Instruction ID: 803877bae1ad05b8f5d56015d28c66aadb2d580b3c84589dbfca39a21343f798
                                                • Opcode Fuzzy Hash: 1d44ac88b03a552206ecbbf9c7254cf5136006cd4a5bef0de58766e3e4aead2f
                                                • Instruction Fuzzy Hash: 1F5183316483119ADB34AF6DF895B7EB3F9AF48310F20883FE596CB291DB7099449B11
                                                APIs
                                                • GetWindowRect.USER32(0139E838,?), ref: 00A59AD2
                                                • ScreenToClient.USER32(00000002,00000002), ref: 00A59B05
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00A59B72
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: 03d291b61b0dc7309cba0f5e60392a35a0c9c2c850a9d9d6c9e45213e113c2e5
                                                • Instruction ID: f707411e317bf7d8b5e7dda856d41dc2a047d3e82ef229dfe248c3b45b4c50d9
                                                • Opcode Fuzzy Hash: 03d291b61b0dc7309cba0f5e60392a35a0c9c2c850a9d9d6c9e45213e113c2e5
                                                • Instruction Fuzzy Hash: 09512D34A00209EFDF10DF68D980AAE7BB6FF54361F158159FD159B290D730AD45CB90
                                                APIs
                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00A46CE4
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A46CF4
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A46D58
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A46D64
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                • String ID:
                                                • API String ID: 2214342067-0
                                                • Opcode ID: 2946e1f953280fc12cfcb443c3b65cc7cbe20e594eef4e5d457b1a451721a1e1
                                                • Instruction ID: d926bd113bef7936069cf05fb356204b2c7cee3daa72c7c2d290b155d3cb178f
                                                • Opcode Fuzzy Hash: 2946e1f953280fc12cfcb443c3b65cc7cbe20e594eef4e5d457b1a451721a1e1
                                                • Instruction Fuzzy Hash: C7418175780210AFEB10BF28DC86F7A77A5AB84B14F44C019FA59AB3D3DB719D018B91
                                                APIs
                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A5F910), ref: 00A467BA
                                                • _strlen.LIBCMT ref: 00A467EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _strlen
                                                • String ID:
                                                • API String ID: 4218353326-0
                                                • Opcode ID: e6cbb79216bf875dbd1f7c3eab7ba95bcb9de6846df0e010037190e00ca05451
                                                • Instruction ID: df81c277beac6edcd5600eb44d980b8a3352abd43b91745ce4097af3f8c6fb79
                                                • Opcode Fuzzy Hash: e6cbb79216bf875dbd1f7c3eab7ba95bcb9de6846df0e010037190e00ca05451
                                                • Instruction Fuzzy Hash: A041A235A00104AFCB14FBA8DDC1FAEB3A9AF85310F148166F81997292DB30AD01C751
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A3BB09
                                                • GetLastError.KERNEL32(?,00000000), ref: 00A3BB2F
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A3BB54
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A3BB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: 92baa1078150014ec20566abb5cb25ca17bdab8b51bddf2c512290eeca0ceda2
                                                • Instruction ID: f74037ae2737c7a01c3296f8c85bdd5b283cc99b34a7cf30d263395c942c301d
                                                • Opcode Fuzzy Hash: 92baa1078150014ec20566abb5cb25ca17bdab8b51bddf2c512290eeca0ceda2
                                                • Instruction Fuzzy Hash: 09411639600A10EFCB10EF19C594A5DBBE2AF89310F09D499F94A9B362CB34FD01CB91
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A58B4D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: 3c0d915c8c1c4096f670300dcf88fac72e9f9533cf4cf33f016d36cffb541e49
                                                • Instruction ID: 021e225e7e489fce080d16d3cf1c6017c1a91ab3964c9b2280a40431f70d7cb2
                                                • Opcode Fuzzy Hash: 3c0d915c8c1c4096f670300dcf88fac72e9f9533cf4cf33f016d36cffb541e49
                                                • Instruction Fuzzy Hash: 5031D4B4601204BFEF209B58CC85FAD37A8FB05352F258612FE51F62A0DE38A9488651
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 00A5AE1A
                                                • GetWindowRect.USER32(?,?), ref: 00A5AE90
                                                • PtInRect.USER32(?,?,00A5C304), ref: 00A5AEA0
                                                • MessageBeep.USER32(00000000), ref: 00A5AF11
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: a71671fed3cb409af694bb6d8c688ceb428d7bd1639f51bab56bd05692a0856b
                                                • Instruction ID: aed1db7af48c302d178bafb2694ef8a50544288780669822cc5ae6c73e0273b0
                                                • Opcode Fuzzy Hash: a71671fed3cb409af694bb6d8c688ceb428d7bd1639f51bab56bd05692a0856b
                                                • Instruction Fuzzy Hash: 61418E70700229DFCB11CF98D885A697BF5FF69742F1482A9EC159B251D730A90ACF92
                                                APIs
                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00A31037
                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00A31053
                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00A310B9
                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00A3110B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: c294d117dc45ef86f99fde6ffe62ac86e94442587e97cba15be9e08a755dccdc
                                                • Instruction ID: 9183e0cc438d556ac5bb18a1cc059dd43804790adbc5dd23badd21c2aab2bb74
                                                • Opcode Fuzzy Hash: c294d117dc45ef86f99fde6ffe62ac86e94442587e97cba15be9e08a755dccdc
                                                • Instruction Fuzzy Hash: 7C314430E40688AEFF38CB698C05BFABBB9AB4A311F08432AF580561D1C37489D19761
                                                APIs
                                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00A31176
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A31192
                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A311F1
                                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00A31243
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: dcacfc2d5f1bc2388ba1dd2e7414a63d9973eb6405d507c3c0240fe9c49352e5
                                                • Instruction ID: 02da357722ec4e5eee397c92465223c24f9eefba370f7f0e6f45b7b8dcac383b
                                                • Opcode Fuzzy Hash: dcacfc2d5f1bc2388ba1dd2e7414a63d9973eb6405d507c3c0240fe9c49352e5
                                                • Instruction Fuzzy Hash: 7331F630A407186EEF31CBA58C15BFABBBAAB49310F04436FF591921D1D3748A9597A1
                                                APIs
                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A0644B
                                                • __isleadbyte_l.LIBCMT ref: 00A06479
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A064A7
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A064DD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                • String ID:
                                                • API String ID: 3058430110-0
                                                • Opcode ID: 9467c84188818735f33edb631090c94f7b56a1ddedba3f551a395c330f109eb5
                                                • Instruction ID: f6815070deacbd852849bf29f799f010814fcc5d767ba5117208c1cc64812ce1
                                                • Opcode Fuzzy Hash: 9467c84188818735f33edb631090c94f7b56a1ddedba3f551a395c330f109eb5
                                                • Instruction Fuzzy Hash: 6031BE3160025AAFDB218F65EE85BBA7BB5FF40328F154129E854871E1EB32D861DB90
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 00A55189
                                                  • Part of subcall function 00A3387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A33897
                                                  • Part of subcall function 00A3387D: GetCurrentThreadId.KERNEL32 ref: 00A3389E
                                                  • Part of subcall function 00A3387D: AttachThreadInput.USER32(00000000,?,00A352A7), ref: 00A338A5
                                                • GetCaretPos.USER32(?), ref: 00A5519A
                                                • ClientToScreen.USER32(00000000,?), ref: 00A551D5
                                                • GetForegroundWindow.USER32 ref: 00A551DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 0be2032bae647cf1a4a4063e88764d5f7e48b70c8d5413b0995e3b098c6ee84b
                                                • Instruction ID: 5dfe88eeb35aa1dea46fdbc214154250805253c03d978dc6f824c3eeb100cc39
                                                • Opcode Fuzzy Hash: 0be2032bae647cf1a4a4063e88764d5f7e48b70c8d5413b0995e3b098c6ee84b
                                                • Instruction Fuzzy Hash: D2310F72D00118AFDB00EFB5D985AEFB7F9EF98304F10806AE415E7251EA759E05CBA0
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • GetCursorPos.USER32(?), ref: 00A5C7C2
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A0BBFB,?,?,?,?,?), ref: 00A5C7D7
                                                • GetCursorPos.USER32(?), ref: 00A5C824
                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A0BBFB,?,?,?), ref: 00A5C85E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                • String ID:
                                                • API String ID: 2864067406-0
                                                • Opcode ID: 52f23d0aa20900c03c72c110da8181f95ef223fbcb39f5468f73eb0384820314
                                                • Instruction ID: 08404fe222c84057ada0607188e2c45670e6f5a8d1ffd38b740e18e3824f10c3
                                                • Opcode Fuzzy Hash: 52f23d0aa20900c03c72c110da8181f95ef223fbcb39f5468f73eb0384820314
                                                • Instruction Fuzzy Hash: 7A318035600218AFCB15CFA8C898EEA7BB6FF49321F04406AFD058B265D7319D55DFA0
                                                APIs
                                                  • Part of subcall function 00A28652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A28669
                                                  • Part of subcall function 00A28652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A28673
                                                  • Part of subcall function 00A28652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28682
                                                  • Part of subcall function 00A28652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28689
                                                  • Part of subcall function 00A28652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A2869F
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A28BEB
                                                • _memcmp.LIBCMT ref: 00A28C0E
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A28C44
                                                • HeapFree.KERNEL32(00000000), ref: 00A28C4B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                • String ID:
                                                • API String ID: 1592001646-0
                                                • Opcode ID: 55aba171beeda4ce2b8c87143c372b93725a2afd4139c868c012ae93f0cc073e
                                                • Instruction ID: d48198579bb076b7343ceee74f85bd4bbf542888a1913612a57aba027ad44d2c
                                                • Opcode Fuzzy Hash: 55aba171beeda4ce2b8c87143c372b93725a2afd4139c868c012ae93f0cc073e
                                                • Instruction Fuzzy Hash: 47216B71E02218EFDB10DFA8D945BAEB7B8FF44355F144069F554A7240DB39AA06CB60
                                                APIs
                                                • __setmode.LIBCMT ref: 009F0BF2
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A37B20,?,?,00000000), ref: 009D5B8C
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A37B20,?,?,00000000,?,?), ref: 009D5BB0
                                                • _fprintf.LIBCMT ref: 009F0C29
                                                • OutputDebugStringW.KERNEL32(?), ref: 00A26331
                                                  • Part of subcall function 009F4CDA: _flsall.LIBCMT ref: 009F4CF3
                                                • __setmode.LIBCMT ref: 009F0C5E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                • String ID:
                                                • API String ID: 521402451-0
                                                • Opcode ID: d83bc9d1f209bb2d49efca286c8de6eff705e959edb2d9864842680f574f4476
                                                • Instruction ID: 6af6e5465e76003ac6e8827088e5e306a71bd03c7c61d54d9097cfb11bf84629
                                                • Opcode Fuzzy Hash: d83bc9d1f209bb2d49efca286c8de6eff705e959edb2d9864842680f574f4476
                                                • Instruction Fuzzy Hash: 2B110632A0420CBBDB04B7B8AC47BBF7B6D9FC1320F24411AF34497292DE655D869795
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A41A97
                                                  • Part of subcall function 00A41B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A41B40
                                                  • Part of subcall function 00A41B21: InternetCloseHandle.WININET(00000000), ref: 00A41BDD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Internet$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 1463438336-0
                                                • Opcode ID: b65ee2a36cc0db7d2bdeb329bdf41cd899f14f125a57e2dbf10823138e7a2513
                                                • Instruction ID: 31040855a00c4cd6fc027f1e7c255c1ac866ed9d3474c099c079c7fdc0e20874
                                                • Opcode Fuzzy Hash: b65ee2a36cc0db7d2bdeb329bdf41cd899f14f125a57e2dbf10823138e7a2513
                                                • Instruction Fuzzy Hash: 0A219239200601BFDB119F608C01FBABBA9FFC8741F10401AFA5596651EB71E8529790
                                                APIs
                                                  • Part of subcall function 00A2F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00A2E1C4,?,?,?,00A2EFB7,00000000,000000EF,00000119,?,?), ref: 00A2F5BC
                                                  • Part of subcall function 00A2F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00A2F5E2
                                                  • Part of subcall function 00A2F5AD: lstrcmpiW.KERNEL32(00000000,?,00A2E1C4,?,?,?,00A2EFB7,00000000,000000EF,00000119,?,?), ref: 00A2F613
                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00A2EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A2E1DD
                                                • lstrcpyW.KERNEL32(00000000,?), ref: 00A2E203
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A2EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A2E237
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: 8be0fd37effe258febefff1fa73424791c520eafa143b1fddd92690dda2a2d7e
                                                • Instruction ID: 90c1be7cb85c2bea987d59f94c47d87b65c9c6066bf6fc0bcf772afb4174ef84
                                                • Opcode Fuzzy Hash: 8be0fd37effe258febefff1fa73424791c520eafa143b1fddd92690dda2a2d7e
                                                • Instruction Fuzzy Hash: B0118136100355EFCF25EF78E845ABA77B8FF85350B44413AE916CB250EB719891D7A0
                                                APIs
                                                • _free.LIBCMT ref: 00A05351
                                                  • Part of subcall function 009F594C: __FF_MSGBANNER.LIBCMT ref: 009F5963
                                                  • Part of subcall function 009F594C: __NMSG_WRITE.LIBCMT ref: 009F596A
                                                  • Part of subcall function 009F594C: RtlAllocateHeap.NTDLL(01380000,00000000,00000001,00000000,?,?,?,009F1013,?), ref: 009F598F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: e5fd3d07b991567ef158061ef1b5ac7542281d14ce6a4c4b1a2b8ecd559229d5
                                                • Instruction ID: 410ce13baf464563a57459648dc941fa0bb8eaf600739d145b532f7fb9bdc1d9
                                                • Opcode Fuzzy Hash: e5fd3d07b991567ef158061ef1b5ac7542281d14ce6a4c4b1a2b8ecd559229d5
                                                • Instruction Fuzzy Hash: 2211C432D04A1DAECB212F70BC1576F3B98AF543A0B10442AFA049E1D0DE75C9419B51
                                                APIs
                                                • _memset.LIBCMT ref: 009D4560
                                                  • Part of subcall function 009D410D: _memset.LIBCMT ref: 009D418D
                                                  • Part of subcall function 009D410D: _wcscpy.LIBCMT ref: 009D41E1
                                                  • Part of subcall function 009D410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009D41F1
                                                • KillTimer.USER32(?,00000001,?,?), ref: 009D45B5
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009D45C4
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A0D6CE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                • String ID:
                                                • API String ID: 1378193009-0
                                                • Opcode ID: 8c4ee47edc009fb90d2bdd16da8eab91bc91458371c703a9521513f84c2a70cf
                                                • Instruction ID: 59e72f622c92d62b1ccee3ec01b3f85ed61fc59afedf61b57bfde9b9e260bcae
                                                • Opcode Fuzzy Hash: 8c4ee47edc009fb90d2bdd16da8eab91bc91458371c703a9521513f84c2a70cf
                                                • Instruction Fuzzy Hash: 4521F671944788AFEB32CBA4EC45BE7BBECAF01308F04409EE69E56281C7755A85CB51
                                                APIs
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A37B20,?,?,00000000), ref: 009D5B8C
                                                  • Part of subcall function 009D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A37B20,?,?,00000000,?,?), ref: 009D5BB0
                                                • gethostbyname.WSOCK32(?,?,?), ref: 00A466AC
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A466B7
                                                • _memmove.LIBCMT ref: 00A466E4
                                                • inet_ntoa.WSOCK32(?), ref: 00A466EF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                • String ID:
                                                • API String ID: 1504782959-0
                                                • Opcode ID: b693578ad596e964f83927141f65a4044b11b3c025d16097e39960030f5b4ab4
                                                • Instruction ID: 6ef95f92ec11f88586cf4de5ba71ca4bd4047e06b944b1a370dd376d09b03f81
                                                • Opcode Fuzzy Hash: b693578ad596e964f83927141f65a4044b11b3c025d16097e39960030f5b4ab4
                                                • Instruction Fuzzy Hash: 8D115E35900509AFCB04FFA4DD86EEEB7B8BF84311B148066F502A7261DF30AE04CBA1
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A29043
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A29055
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A2906B
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A29086
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 14517d28665db17591ffd71402f98ac37c7951b099400a70e8e04ff4d745e7cd
                                                • Instruction ID: 8bc288268fc4577ae971b7fc5a352a483b060c0e1502eefb314a290d99629bae
                                                • Opcode Fuzzy Hash: 14517d28665db17591ffd71402f98ac37c7951b099400a70e8e04ff4d745e7cd
                                                • Instruction Fuzzy Hash: 1E115E79900218FFEB10DFA9CD84EDEBBB4FB48710F2040A5EA04B7250D6716E10DB90
                                                APIs
                                                  • Part of subcall function 009D2612: GetWindowLongW.USER32(?,000000EB), ref: 009D2623
                                                • DefDlgProcW.USER32(?,00000020,?), ref: 009D12D8
                                                • GetClientRect.USER32(?,?), ref: 00A0B84B
                                                • GetCursorPos.USER32(?), ref: 00A0B855
                                                • ScreenToClient.USER32(?,?), ref: 00A0B860
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                • String ID:
                                                • API String ID: 4127811313-0
                                                • Opcode ID: 9a20cef1cf9ad1296b4c387a39ff7d1fd4cea36e035e922e9106c200dad655d3
                                                • Instruction ID: 89437f9d058d148ad54f41c5031aae184b1a0aab00d09014b15b85610ae3abca
                                                • Opcode Fuzzy Hash: 9a20cef1cf9ad1296b4c387a39ff7d1fd4cea36e035e922e9106c200dad655d3
                                                • Instruction Fuzzy Hash: 16113636A40119BFCB00EFA8D8859EE77B9FB05301F108456FA21E7250D731BA528BA5
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A301FD,?,00A31250,?,00008000), ref: 00A3166F
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00A301FD,?,00A31250,?,00008000), ref: 00A31694
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A301FD,?,00A31250,?,00008000), ref: 00A3169E
                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,00A301FD,?,00A31250,?,00008000), ref: 00A316D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: 8297f55b8f502b2287123b745f4b5c69a46bc5a7a15da8601cf78a8be364bcbf
                                                • Instruction ID: 3be9d56e26021b9fa28920896eb27b5d361d1151c84cdaa776f7941bd58825b0
                                                • Opcode Fuzzy Hash: 8297f55b8f502b2287123b745f4b5c69a46bc5a7a15da8601cf78a8be364bcbf
                                                • Instruction Fuzzy Hash: 53118E31C01A1CDBCF00EFE5D84AAEEBB78FF09742F044555EA44B2240CB3055608BD6
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                • String ID:
                                                • API String ID: 3016257755-0
                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                • Instruction ID: 4233a72648d108932add77188761418636f1f7d1a2f131218d995278af6fe492
                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                • Instruction Fuzzy Hash: EA018C7284814EBBCF525F84EC418EE3F22BF2D340B488615FA1858071C237E9B1AB81
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00A5B59E
                                                • ScreenToClient.USER32(?,?), ref: 00A5B5B6
                                                • ScreenToClient.USER32(?,?), ref: 00A5B5DA
                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5B5F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClientRectScreen$InvalidateWindow
                                                • String ID:
                                                • API String ID: 357397906-0
                                                • Opcode ID: 6be4761daa14cb68e7d0f9a1531377f34f1998bd8a58c2ecfaada847a7579288
                                                • Instruction ID: 52856f2a3388a85e67f1edf57f3942a9b31bae6e7206eac31aa97a5ea444b620
                                                • Opcode Fuzzy Hash: 6be4761daa14cb68e7d0f9a1531377f34f1998bd8a58c2ecfaada847a7579288
                                                • Instruction Fuzzy Hash: 171143B9D00249EFDB41CFA9C8849EEFBB9FB18311F108166E915E3620D735AA55CF90
                                                APIs
                                                • _memset.LIBCMT ref: 00A5B8FE
                                                • _memset.LIBCMT ref: 00A5B90D
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00A97F20,00A97F64), ref: 00A5B93C
                                                • CloseHandle.KERNEL32 ref: 00A5B94E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _memset$CloseCreateHandleProcess
                                                • String ID:
                                                • API String ID: 3277943733-0
                                                • Opcode ID: 0065e4e54c869b814efdf1101a1fb22558357942a039fc8779a2eccf3887497d
                                                • Instruction ID: ce0c2e948363e53e93d6dbdac9702693372fa2b1fbdb444628f90bd3c697bcd3
                                                • Opcode Fuzzy Hash: 0065e4e54c869b814efdf1101a1fb22558357942a039fc8779a2eccf3887497d
                                                • Instruction Fuzzy Hash: 3EF054B26543147FF610A7A5AC05F7F3A9CEB09355F004022BB08E51A1DB754D01C7B8
                                                APIs
                                                • EnterCriticalSection.KERNEL32(?), ref: 00A36E88
                                                  • Part of subcall function 00A3794E: _memset.LIBCMT ref: 00A37983
                                                • _memmove.LIBCMT ref: 00A36EAB
                                                • _memset.LIBCMT ref: 00A36EB8
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00A36EC8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                • String ID:
                                                • API String ID: 48991266-0
                                                • Opcode ID: f32892067d557e1046afb84bcd8ced087b62179f59723934145f2fe6302cacc9
                                                • Instruction ID: aaa2c666d7f79daf3e24b68695ef922c7923ad9202e56fce990698d055eecd1b
                                                • Opcode Fuzzy Hash: f32892067d557e1046afb84bcd8ced087b62179f59723934145f2fe6302cacc9
                                                • Instruction Fuzzy Hash: 1EF0547A100214AFCF016F55DC85B9ABB29EF45321F08C061FE085F216CB35E911CBB4
                                                APIs
                                                  • Part of subcall function 009D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D134D
                                                  • Part of subcall function 009D12F3: SelectObject.GDI32(?,00000000), ref: 009D135C
                                                  • Part of subcall function 009D12F3: BeginPath.GDI32(?), ref: 009D1373
                                                  • Part of subcall function 009D12F3: SelectObject.GDI32(?,00000000), ref: 009D139C
                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A5C030
                                                • LineTo.GDI32(00000000,?,?), ref: 00A5C03D
                                                • EndPath.GDI32(00000000), ref: 00A5C04D
                                                • StrokePath.GDI32(00000000), ref: 00A5C05B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: bc283736d365b2df4788ad8f1621fa1dedcc21dbf0e13f223a3dea28b55f84cf
                                                • Instruction ID: 38c7ebeb6895007bc05a7db09333332dbd2ea4a8b91ee996ea1812ebf507f3a3
                                                • Opcode Fuzzy Hash: bc283736d365b2df4788ad8f1621fa1dedcc21dbf0e13f223a3dea28b55f84cf
                                                • Instruction Fuzzy Hash: 63F05E32141359BFDB12AF95AC0DFCE3F99BF05322F088011FA11610E287765656CB95
                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A2A399
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2A3AC
                                                • GetCurrentThreadId.KERNEL32 ref: 00A2A3B3
                                                • AttachThreadInput.USER32(00000000), ref: 00A2A3BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: b978f6c469db77b230e402d0678e314cdaec9b427749d5f8a1b7565bff53dc31
                                                • Instruction ID: 877f97a8df1a08d7423cdc1202c19a5fd2eb8f622ae44fee1d4ce9c1772cf6e1
                                                • Opcode Fuzzy Hash: b978f6c469db77b230e402d0678e314cdaec9b427749d5f8a1b7565bff53dc31
                                                • Instruction Fuzzy Hash: DFE0C931545378BBDB209BA6EC0DED77F5CFF267A2F008035F60999461C6718541DBA1
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 009D2231
                                                • SetTextColor.GDI32(?,000000FF), ref: 009D223B
                                                • SetBkMode.GDI32(?,00000001), ref: 009D2250
                                                • GetStockObject.GDI32(00000005), ref: 009D2258
                                                • GetWindowDC.USER32(?,00000000), ref: 00A0C0D3
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A0C0E0
                                                • GetPixel.GDI32(00000000,?,00000000), ref: 00A0C0F9
                                                • GetPixel.GDI32(00000000,00000000,?), ref: 00A0C112
                                                • GetPixel.GDI32(00000000,?,?), ref: 00A0C132
                                                • ReleaseDC.USER32(?,00000000), ref: 00A0C13D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                • String ID:
                                                • API String ID: 1946975507-0
                                                • Opcode ID: af4ef810f905145ae83442efa59bdbe6a68f837daa76df9bc34158bc1ab0b1cd
                                                • Instruction ID: c557bb6718b69093657f3ac87477008a7248b3953d221323a8150b86bba5e436
                                                • Opcode Fuzzy Hash: af4ef810f905145ae83442efa59bdbe6a68f837daa76df9bc34158bc1ab0b1cd
                                                • Instruction Fuzzy Hash: 5CE03932500644EEDB219FA4FC09BD87B14FB15332F008366FBA9480E187714981DB11
                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 00A28C63
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A2882E), ref: 00A28C6A
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A2882E), ref: 00A28C77
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A2882E), ref: 00A28C7E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: 0252d38d060ff988dcb91a819bc6e4206bea19335ac72ad57675dd69787a9283
                                                • Instruction ID: 50f1694054ed7e44cd531353fa11c9dcc0f9554343263cde93f1785ee2c1d694
                                                • Opcode Fuzzy Hash: 0252d38d060ff988dcb91a819bc6e4206bea19335ac72ad57675dd69787a9283
                                                • Instruction Fuzzy Hash: 04E04F766423219FD7609FF47D0CB9B3BA8BF60793F084838B645CA080EA3884428B61
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 00A12187
                                                • GetDC.USER32(00000000), ref: 00A12191
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A121B1
                                                • ReleaseDC.USER32(?), ref: 00A121D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: ee733d118afcc548328a3385060dfc2648d660978c2e0689925119274712e820
                                                • Instruction ID: 3cb3b55ed116956ed6fde89d8285ed88379a4cc4a3032f9c4db2dc0fca4963b7
                                                • Opcode Fuzzy Hash: ee733d118afcc548328a3385060dfc2648d660978c2e0689925119274712e820
                                                • Instruction Fuzzy Hash: E5E0E5B5840214EFDB019FA0C808B9DBBF1FB4C352F108426F95A97260DB3881429F40
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 00A1219B
                                                • GetDC.USER32(00000000), ref: 00A121A5
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A121B1
                                                • ReleaseDC.USER32(?), ref: 00A121D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 7f40ff3364b7aee2d91bb85aa2017e5f61ad4ca8f41bce73da56cf35738434cb
                                                • Instruction ID: 146d1ca2630ce627e16ba3fb9264ba75ea6cf0773ee46916543529896a98dcbb
                                                • Opcode Fuzzy Hash: 7f40ff3364b7aee2d91bb85aa2017e5f61ad4ca8f41bce73da56cf35738434cb
                                                • Instruction Fuzzy Hash: E1E0EEB5800204AFCB01AFA0C80869EBBE1BB4C312F10842AF95AA7260EB3891429F40
                                                APIs
                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00A2B981
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ContainedObject
                                                • String ID: AutoIt3GUI$Container
                                                • API String ID: 3565006973-3941886329
                                                • Opcode ID: c6e1c81db25c5cd02d3d02aed33f4632f14242a8a96e2906e35a2885b1c9753b
                                                • Instruction ID: ab1921bb1aa834db9d8fa43ed9693e2b8729a500d0376f4510ea11b157b01764
                                                • Opcode Fuzzy Hash: c6e1c81db25c5cd02d3d02aed33f4632f14242a8a96e2906e35a2885b1c9753b
                                                • Instruction Fuzzy Hash: F4914A70610611AFDB24DF68D884B6ABBF9FF49710F14856EF94ACB691DB70E840CB60
                                                APIs
                                                  • Part of subcall function 009EFEC6: _wcscpy.LIBCMT ref: 009EFEE9
                                                  • Part of subcall function 009D9997: __itow.LIBCMT ref: 009D99C2
                                                  • Part of subcall function 009D9997: __swprintf.LIBCMT ref: 009D9A0C
                                                • __wcsnicmp.LIBCMT ref: 00A3B298
                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00A3B361
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                • String ID: LPT
                                                • API String ID: 3222508074-1350329615
                                                • Opcode ID: 4274ca4ac82357fa0b5f919111d627227fe3c17c48ffd8b75fc9b6d89dbc546c
                                                • Instruction ID: a5b442a7bc2c893ac2b98d37d520db24059da3170174402e5616508c5d3b9fca
                                                • Opcode Fuzzy Hash: 4274ca4ac82357fa0b5f919111d627227fe3c17c48ffd8b75fc9b6d89dbc546c
                                                • Instruction Fuzzy Hash: 0C619575A10215EFCB14EF98C891EAEB7B5EF48310F11815AF646AB351DB70AE40CB60
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 009E2AC8
                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 009E2AE1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: 1193207fc2b7b9a8a8e5806b7ad781986478fb2d375c43fe72d814bd40f015bd
                                                • Instruction ID: 9b8af2f22e40b1a89551ee9535a0d8cbf164f266e64564af3a34ce640d4102cd
                                                • Opcode Fuzzy Hash: 1193207fc2b7b9a8a8e5806b7ad781986478fb2d375c43fe72d814bd40f015bd
                                                • Instruction Fuzzy Hash: F05127724187449BD320BF50DC86BABBBE8FBC4314F42885EF1D9911A5DB308969CB66
                                                APIs
                                                  • Part of subcall function 009D506B: __fread_nolock.LIBCMT ref: 009D5089
                                                • _wcscmp.LIBCMT ref: 00A39AAE
                                                • _wcscmp.LIBCMT ref: 00A39AC1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: _wcscmp$__fread_nolock
                                                • String ID: FILE
                                                • API String ID: 4029003684-3121273764
                                                • Opcode ID: 7e6d44e86d4b8acb8255dd18bdcf6e8a1ba72a45df64f31a645ed2a5423a73a7
                                                • Instruction ID: 0fb0767387dfdc21c13ca2c944ffbad2c325c3c66c10fcbac64606ef12e8454f
                                                • Opcode Fuzzy Hash: 7e6d44e86d4b8acb8255dd18bdcf6e8a1ba72a45df64f31a645ed2a5423a73a7
                                                • Instruction Fuzzy Hash: 8641E971A40609BBDF209FA0DC45FEFBBBDDF85710F01446AF904A7281D7B59A0487A1
                                                APIs
                                                • _memset.LIBCMT ref: 00A42892
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A428C8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CrackInternet_memset
                                                • String ID: |
                                                • API String ID: 1413715105-2343686810
                                                • Opcode ID: 2ce4b23aeb76a9f63efa9fc450ee51f921d80b4c3cb73354447a1fdad325d0d3
                                                • Instruction ID: 5e211db6b158d33341788cef237104f76ef8a516d3e98c1b0d47d48970684267
                                                • Opcode Fuzzy Hash: 2ce4b23aeb76a9f63efa9fc450ee51f921d80b4c3cb73354447a1fdad325d0d3
                                                • Instruction Fuzzy Hash: 02313D71800119AFCF01EFA1CC85EEEBFB9FF48340F10402AF815A6266EB315A56DB60
                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 00A56D86
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A56DC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: a3282ffe32ff7681d529468ecde1f1aa034669a05181b9d061e0e05a909fc50f
                                                • Instruction ID: 8d20153707cf0dfff000951104ac877776e7402c01386d8f57c7ecb31573f1a7
                                                • Opcode Fuzzy Hash: a3282ffe32ff7681d529468ecde1f1aa034669a05181b9d061e0e05a909fc50f
                                                • Instruction Fuzzy Hash: FE317E72210604AEDB10DF64CC80BFB77B9FF48721F549A19FDA597190DA31AC95CB60
                                                APIs
                                                • _memset.LIBCMT ref: 00A32E00
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A32E3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: 9ada1fe895fcab172315040f5e66f83380721b29213d2f43ec8e5bc958ea7c0f
                                                • Instruction ID: 2537b90cba62d6ebd4b95fd77e52d8b0a4b2ee4bdd46c6d8bb186113a42b29bb
                                                • Opcode Fuzzy Hash: 9ada1fe895fcab172315040f5e66f83380721b29213d2f43ec8e5bc958ea7c0f
                                                • Instruction Fuzzy Hash: 7A31E631600309EBEB24CF58C846BAEBFB9FF45350F24402AF985961A0E7709940CB50
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A569D0
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A569DB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 24db517529602a49eecff0efd5706ba85a00b2814cf43ea8259978fa4c423456
                                                • Instruction ID: cdeeb591d2372066ed9633c77bbc8f9d40daba8c159d38f9c7e2d98399fa27b5
                                                • Opcode Fuzzy Hash: 24db517529602a49eecff0efd5706ba85a00b2814cf43ea8259978fa4c423456
                                                • Instruction Fuzzy Hash: E111BF71700208BFEF119F64CC80EEB3BAAFB993A5F514125FD589B2A0D6719C558BA0
                                                APIs
                                                  • Part of subcall function 009D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D1D73
                                                  • Part of subcall function 009D1D35: GetStockObject.GDI32(00000011), ref: 009D1D87
                                                  • Part of subcall function 009D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D1D91
                                                • GetWindowRect.USER32(00000000,?), ref: 00A56EE0
                                                • GetSysColor.USER32(00000012), ref: 00A56EFA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: 29a1e4482dbc2308f1292d786d65e3051904012408be4205594534a1b51017eb
                                                • Instruction ID: c9dde7f11a177af086bb6150d4b3e2c542b3dda15e951ab060fc3a67249ea347
                                                • Opcode Fuzzy Hash: 29a1e4482dbc2308f1292d786d65e3051904012408be4205594534a1b51017eb
                                                • Instruction Fuzzy Hash: FF212972A10209AFDB04DFA8DD45AEA7BB8FB08315F044629FD55D3250E734E865DB60
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 00A56C11
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A56C20
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: bb84b9c78df73427a7bc6408cbc6375f51e1be070c26b48230954ffcf10f1bb9
                                                • Instruction ID: 85cd02654d8a10b8b72d8a2f73ac6ba50eff56f8ef722a3888f0409e21942be2
                                                • Opcode Fuzzy Hash: bb84b9c78df73427a7bc6408cbc6375f51e1be070c26b48230954ffcf10f1bb9
                                                • Instruction Fuzzy Hash: C6116A71541208AFEB108FA49C41AAB376AFB0437AFA14724FD61D71E0C775EC999B60
                                                APIs
                                                • _memset.LIBCMT ref: 00A32F11
                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00A32F30
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: 3f6248dfa4fa7b0c3de7d9d6ee0d878e57cf6b1511763318ff1379d0dd9471a7
                                                • Instruction ID: b3ddc28f54d1851a940658baf305b950decc5eb1307cade2b0a1a4e53652e36c
                                                • Opcode Fuzzy Hash: 3f6248dfa4fa7b0c3de7d9d6ee0d878e57cf6b1511763318ff1379d0dd9471a7
                                                • Instruction Fuzzy Hash: 7411C431A01214ABDB21DB98DC46BA977B9EF05350F1880B6F854A72A0DBB0EE15C791
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A42520
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A42549
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: ce0ca4cefd2ea91b44e9bd36c5f995522b236e15334af927c0f3619faf67b124
                                                • Instruction ID: af568ca815e0e8f22479adb7e4d5f75b7aeecf4ac4ef87752d9f3c80afc7094c
                                                • Opcode Fuzzy Hash: ce0ca4cefd2ea91b44e9bd36c5f995522b236e15334af927c0f3619faf67b124
                                                • Instruction Fuzzy Hash: 2711E078501225BEEB249F518C98FBBFF68FF46351F50812AF90543040D2B46981DBF1
                                                APIs
                                                  • Part of subcall function 00A4830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00A480C8,?,00000000,?,?), ref: 00A48322
                                                • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A480CB
                                                • htons.WSOCK32(00000000,?,00000000), ref: 00A48108
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWidehtonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 2496851823-2422070025
                                                • Opcode ID: d3cda2aee0a06a177aefd9033dbbdec43cff30eab2cc95b3a8c594d8cd7cf8a1
                                                • Instruction ID: 1cb9ff03f617557be59fbdeb9f453aa634b324b3ede1347cc141b710938dbe39
                                                • Opcode Fuzzy Hash: d3cda2aee0a06a177aefd9033dbbdec43cff30eab2cc95b3a8c594d8cd7cf8a1
                                                • Instruction Fuzzy Hash: 6B11E538100305ABDB20EF68DC46FADB334FF84310F108627E91197291DB71A811C755
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A29355
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: 2741e868a57320323be63fb796cbbc596801224678df78f6436f9eba2b366478
                                                • Instruction ID: 77a38f1de3aa080b3951c92a17144dc174ccd48e60949277b9a25e87af393be4
                                                • Opcode Fuzzy Hash: 2741e868a57320323be63fb796cbbc596801224678df78f6436f9eba2b366478
                                                • Instruction Fuzzy Hash: D601F571A45224ABCB04FBA8CC919FF7369BF46320B140629F8325B3D1DB31580C8760
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A2924D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: 472c07d6e3107d3c6a7e5e98bda8cd3ec52e2a3ec319a88796b50453cd956dc3
                                                • Instruction ID: aa9186b89e2031bfc470dd3f42934b1c6f403ad047b04c28800869a261b515fa
                                                • Opcode Fuzzy Hash: 472c07d6e3107d3c6a7e5e98bda8cd3ec52e2a3ec319a88796b50453cd956dc3
                                                • Instruction Fuzzy Hash: 4901A771A85215BBCB19EBA4D992EFF73ACAF45740F14002AB91267281EB115F0C9771
                                                APIs
                                                  • Part of subcall function 009D7F41: _memmove.LIBCMT ref: 009D7F82
                                                  • Part of subcall function 00A2B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B0E7
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A292D0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_memmove
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 372448540-1403004172
                                                • Opcode ID: c882087bbd5054478a3f658c4406dadd9fb749022d2d0d34b37c922c74f46fc0
                                                • Instruction ID: cc72ad458fd5d205c0b54bc6feaae8cf1de30f552aa20ad1b80ffc36af3df239
                                                • Opcode Fuzzy Hash: c882087bbd5054478a3f658c4406dadd9fb749022d2d0d34b37c922c74f46fc0
                                                • Instruction Fuzzy Hash: 7801DB71A85215B7CB15F7A8D982FFF77AC9F15740F244126781263281DB215F0C9371
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp
                                                • String ID: #32770
                                                • API String ID: 2292705959-463685578
                                                • Opcode ID: ca554417f4e9c2bfb4fadb7038d4a5f348830fa083b9f53816e9a3d1d4d7d933
                                                • Instruction ID: b811a41fcf3fe2e7ec88292bedb660889ecbd8983516f76c5537fc95d1d5e76a
                                                • Opcode Fuzzy Hash: ca554417f4e9c2bfb4fadb7038d4a5f348830fa083b9f53816e9a3d1d4d7d933
                                                • Instruction Fuzzy Hash: 11E02232A0022C2AE320EAE9AC49BA7F7ACFB45721F00016BF910D3050E5609A058BE0
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A281CA
                                                  • Part of subcall function 009F3598: _doexit.LIBCMT ref: 009F35A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: Message_doexit
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 1993061046-4017498283
                                                • Opcode ID: ad93e15f8d5403e64e0018d611523059309f7537c4bd26c252381ab85338119f
                                                • Instruction ID: 3d75571e2f2abdb652750eaef2e7685460110241005da9e3aa337451235cec39
                                                • Opcode Fuzzy Hash: ad93e15f8d5403e64e0018d611523059309f7537c4bd26c252381ab85338119f
                                                • Instruction Fuzzy Hash: C6D05B323C535C36D31433E86C07FDA79485B55B56F044426BB08555D38DE5559243D9
                                                APIs
                                                  • Part of subcall function 00A0B564: _memset.LIBCMT ref: 00A0B571
                                                  • Part of subcall function 009F0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A0B540,?,?,?,009D100A), ref: 009F0B89
                                                • IsDebuggerPresent.KERNEL32(?,?,?,009D100A), ref: 00A0B544
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009D100A), ref: 00A0B553
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A0B54E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 3158253471-631824599
                                                • Opcode ID: 33a6b7910fc5723243397f4da01f128130b0419bbd82d6d9c0a34b67a522aad4
                                                • Instruction ID: bd3c8896c822ea37dcfba6ff9d0eb3514b142b835b450c21567d4d357b1a27e1
                                                • Opcode Fuzzy Hash: 33a6b7910fc5723243397f4da01f128130b0419bbd82d6d9c0a34b67a522aad4
                                                • Instruction Fuzzy Hash: A1E06DB06107148FD720DF68EA043467BE4BF00755F00C96DE446C7791EBB4E405CB61
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A55BF5
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A55C08
                                                  • Part of subcall function 00A354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A3555E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1648828579.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                                • Associated: 00000000.00000002.1648815145.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1648895588.0000000000A85000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649025101.0000000000A8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1649045595.0000000000A98000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9d0000_arrival notice.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: f6d751d733b5f19a0c19cfd7bd02980f4aa37f5750443f20f80a023f902ecc5a
                                                • Instruction ID: f7478a0157076257f5a1357bebf67ecc67134799bbdb1685a20eb29f387aeb68
                                                • Opcode Fuzzy Hash: f6d751d733b5f19a0c19cfd7bd02980f4aa37f5750443f20f80a023f902ecc5a
                                                • Instruction Fuzzy Hash: E1D0C931798311BBE768BBB0AD4FF976A14BB10B52F040825B745AA1D0D9F45801C654